Novell Client NDPPNT.DLL Unspecified Buffer Overflow Vulnerability
BID:21479
Info
Novell Client NDPPNT.DLL Unspecified Buffer Overflow Vulnerability
| Bugtraq ID: | 21479 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 07 2006 12:00AM |
| Updated: | Dec 07 2006 12:00AM |
| Credit: | The vendor disclosed this issue. |
| Vulnerable: |
Novell Client 4.91 SP3 Novell Client 4.91 SP2 Novell Client 4.91 SP1 Novell Client 4.91 SP1 Novell Client 4.91 |
| Not Vulnerable: | |
Discussion
Novell Client NDPPNT.DLL Unspecified Buffer Overflow Vulnerability
Novell Client is prone to an unspecified buffer-overflow vulnerability because it fails to perform adequate bounds-checking on user-supplied data before copying it to an insufficiently sized buffer.
An attacker could exploit this issue to have arbitrary code execute in the context of the affected application. Failed attempts will likely cause denial-of-service conditions.
Novell Client is prone to an unspecified buffer-overflow vulnerability because it fails to perform adequate bounds-checking on user-supplied data before copying it to an insufficiently sized buffer.
An attacker could exploit this issue to have arbitrary code execute in the context of the affected application. Failed attempts will likely cause denial-of-service conditions.
Exploit / POC
Novell Client NDPPNT.DLL Unspecified Buffer Overflow Vulnerability
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution / Fix
Novell Client NDPPNT.DLL Unspecified Buffer Overflow Vulnerability
Solution:
The vendor has released a fix that addresses this issue. Please see the references for more information.
Novell Client 4.91 SP1
Novell Client 4.91
Novell Client 4.91 SP3
Novell Client 4.91 SP1
Novell Client 4.91 SP2
Solution:
The vendor has released a fix that addresses this issue. Please see the references for more information.
Novell Client 4.91 SP1
-
Novell 491psp3_ndppnt.exe
http://support.novell.com/servlet/filedownload/uns/ftf/491psp3_ndppnt. exe
Novell Client 4.91
-
Novell 491psp3_ndppnt.exe
http://support.novell.com/servlet/filedownload/uns/ftf/491psp3_ndppnt. exe
Novell Client 4.91 SP3
-
Novell 491psp3_ndppnt.exe
http://support.novell.com/servlet/filedownload/uns/ftf/491psp3_ndppnt. exe
Novell Client 4.91 SP1
-
Novell 491psp3_ndppnt.exe
http://support.novell.com/servlet/filedownload/uns/ftf/491psp3_ndppnt. exe
Novell Client 4.91 SP2
-
Novell 491psp3_ndppnt.exe
http://support.novell.com/servlet/filedownload/uns/ftf/491psp3_ndppnt. exe
References
Novell Client NDPPNT.DLL Unspecified Buffer Overflow Vulnerability
References:
References:
- Novell Client Product Homepage (Novell)
- Novell Client 4.91 Post-SP3 NDPPNT.DLL (Novell)