First published: Fri Nov 02 2007(Updated: )
Heap-based buffer overflow in the Client Trust application (clntrust.exe) in Novell BorderManager 3.8 before Update 1.5 allows remote attackers to execute arbitrary code via a validation request in which the Novell tree name is not properly delimited with a wide-character backslash or NULL character.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell BorderManager | <=3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5767 is classified as critical due to its potential for remote code execution.
To mitigate CVE-2007-5767, update Novell BorderManager to version 3.8 Update 1.5 or later.
CVE-2007-5767 affects Novell BorderManager 3.8 prior to Update 1.5.
CVE-2007-5767 allows remote attackers to execute arbitrary code through a heap-based buffer overflow.
There are no documented workarounds for CVE-2007-5767; upgrading is the recommended approach.