Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 through 4.91 SP2 allow remote attackers to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions.
Link | Tags |
---|---|
http://www.kb.cert.org/vuls/id/300636 | third party advisory us government resource |
http://www.securityfocus.com/data/vulnerabilities/exploits/testlpc.c | |
http://www.novell.com/support/search.do?cmd=displayKC&externalId=3125538&sliceId=SAL_Public | patch vendor advisory |
http://securitytracker.com/id?1017263 | vdb entry |
http://www.securityfocus.com/bid/21220 | vdb entry |
http://www.vupen.com/english/advisories/2006/4631 | vdb entry |
http://www.securityfocus.com/archive/1/453012/100/0/threaded | mailing list |
http://securitytracker.com/id?1017315 | vdb entry |
http://www.zerodayinitiative.com/advisories/ZDI-06-043.html | patch vendor advisory |
http://www.kb.cert.org/vuls/id/653076 | third party advisory us government resource |
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/30461 | vdb entry |
http://secunia.com/advisories/23027 | third party advisory |