First published: Fri Jul 25 2003(Updated: )
Buffer overflow in the CGI2PERL.NLM PERL handler in Novell Netware 5.1 and 6.0 allows remote attackers to cause a denial of service (ABEND) via a long input string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell NetWare | =5.1-sp6 | |
Novell NetWare | =5.1 | |
Novell NetWare | =5.1-sp4 | |
Novell NetWare | =6.0-sp1 | |
Novell NetWare | =6.0 | |
Novell NetWare | =6.0-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0562 has a severity rating that indicates it can lead to denial of service due to a buffer overflow.
To fix CVE-2003-0562, apply the latest patches from Novell for affected versions of NetWare.
CVE-2003-0562 affects Novell NetWare versions 5.1 and 6.0, including service packs.
CVE-2003-0562 can be exploited by sending a long input string to the CGI2PERL.NLM handler.
Exploiting CVE-2003-0562 can lead to a system crash and denial of service as it causes an ABEND.