Vulnerability Details : CVE-2009-1350
Public exploit exists!
Unspecified vulnerability in xtagent.exe in Novell NetIdentity Client before 1.2.4 allows remote attackers to execute arbitrary code by establishing an IPC$ connection to the XTIERRPCPIPE named pipe, and sending RPC messages that trigger a dereference of an arbitrary pointer.
Vulnerability category: Input validationExecute code
Products affected by CVE-2009-1350
- cpe:2.3:a:novell:netidentity_client1.2.3:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-1350
73.91%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2009-1350
-
Novell NetIdentity Agent XTIERRPCPIPE Named Pipe Buffer Overflow
Disclosure Date: 2009-04-06First seen: 2020-04-26exploit/windows/smb/netidentity_xtierrpcpipeThis module exploits a stack buffer overflow in Novell's NetIdentity Agent. When sending a specially crafted string to the 'XTIERRPCPIPE' named pipe, an attacker may be able to execute arbitrary code. The success of this module is much greater once the service has
CVSS scores for CVE-2009-1350
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2009-1350
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-1350
-
http://www.securitytracker.com/id?1021990
-
http://www.securityfocus.com/archive/1/502514/100/0/threaded
-
http://download.novell.com/Download?buildid=6ERQGPjRZ8o~
Patch;Vendor Advisory
-
http://www.vupen.com/english/advisories/2009/0954
Patch;Vendor Advisory
-
https://bugzilla.novell.com/show_bug.cgi?id=437511
-
http://www.securityfocus.com/bid/34400
Novell NetIdentity Agent 'XTIERRPCPIPE' Remote Code Execution Vulnerability
-
http://www.zerodayinitiative.com/advisories/ZDI-09-016/
Patch
Jump to