Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Windows --> Category: infos

Novell Client nwspool.dll Buffer Overflow Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks file version of nwspool.dll

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote Windows host contains a DLL that suffers from a buffer
overflow flaw.

Description :

The file 'nwspool.dll' included with the Novell Client software
reportedly contains a buffer overflow that can be triggered by long
arguments to the Win32 'EnumPrinters()' and 'OpenPrinter()' functions.
An anonymous remote attacker may be able to leverage this issue via
RPC requests to the Spooler service to execute arbitrary code remotely
on the affected host.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-06-043.html
http://www.securityfocus.com/archive/1/archive/1/453012/100/0/threaded
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm

Solution :

Install the 491psp3_nwspool.exe patch file referenced in the vendor
advisory above.

Threat Level:

High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.