Novell Client NWSPOOL.DLL RPC Request Multiple Buffer Overflow Vulnerabilities
BID:25474
Info
Novell Client NWSPOOL.DLL RPC Request Multiple Buffer Overflow Vulnerabilities
| Bugtraq ID: | 25474 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2007-2954 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 29 2007 12:00AM |
| Updated: | Sep 04 2007 07:21PM |
| Credit: | JJ Reyes of Secunia Research is credited with the discovery of this vulnerability. |
| Vulnerable: |
Novell Client 4.91 SP4 |
| Not Vulnerable: | |
Discussion
Novell Client NWSPOOL.DLL RPC Request Multiple Buffer Overflow Vulnerabilities
Novell Client is prone to multiple buffer-overflow vulnerabilities because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.
A remote attacker may exploit these issues to execute arbitrary code within the context of the affected application or crash the application, denying service to legitimate users.
Novell Client 4.91 SP4 is vulnerable; other versions may also be affected.
Novell Client is prone to multiple buffer-overflow vulnerabilities because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.
A remote attacker may exploit these issues to execute arbitrary code within the context of the affected application or crash the application, denying service to legitimate users.
Novell Client 4.91 SP4 is vulnerable; other versions may also be affected.
Exploit / POC
Novell Client NWSPOOL.DLL RPC Request Multiple Buffer Overflow Vulnerabilities
Currently we are not aware of any working exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
Currently we are not aware of any working exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
Solution / Fix
Novell Client NWSPOOL.DLL RPC Request Multiple Buffer Overflow Vulnerabilities
Solution:
Novell has released a Field Test File (FTF) to address these issues. Please see the references for more information.
Novell Client 4.91 SP4
Solution:
Novell has released a Field Test File (FTF) to address these issues. Please see the references for more information.
Novell Client 4.91 SP4
-
Novell Novell Client 4.91 Post-SP2/3/4 NWSPOOL.DLL
http://download.novell.com/protected/Export.jsp?buildid=VOXNZb-6t_g~
References
Novell Client NWSPOOL.DLL RPC Request Multiple Buffer Overflow Vulnerabilities
References:
References:
- Novell Homepage (Novell)
- Novell Client 4.91 Post-SP2/3/4 NWSPOOL.DLL (Novell)
- Novell Client NWSPOOL.DLL Buffer Overflow Vulnerabilities (Secunia Research)