|
Family: Windows --> Category: infos
Novell Client nwspool.dll Buffer Overflow Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks file version of nwspool.dll
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote Windows host contains a DLL that suffers from a buffer
overflow flaw.
Description :
The file 'nwspool.dll' included with the Novell Client software
reportedly contains a buffer overflow that can be triggered by long
arguments to the Win32 'EnumPrinters()' and 'OpenPrinter()' functions.
An anonymous remote attacker may be able to leverage this issue via
RPC requests to the Spooler service to execute arbitrary code remotely
on the affected host.
See also :
http://www.zerodayinitiative.com/advisories/ZDI-06-043.html
http://www.securityfocus.com/archive/1/archive/1/453012/100/0/threaded
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm
Solution :
Install the 491psp3_nwspool.exe patch file referenced in the vendor
advisory above.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|