Vulnerability Name:

CVE-2006-5854 (CCN-30461)

Assigned:2006-11-20
Published:2006-11-20
Updated:2018-10-17
Summary:Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 through 4.91 SP2 allow remote attackers to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions.
CVSS v3 Severity:9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.6 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2006-5854

Source: MITRE
Type: CNA
CVE-2006-6114

Source: CCN
Type: SA23027
Novell Client NWSPOOL.DLL Buffer Overflow Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
23027

Source: CCN
Type: SECTRACK ID: 1017263
Novell Client Buffer Overflow in NWSPOOL.DLL Has Unspecified Impact

Source: SECTRACK
Type: UNKNOWN
1017263

Source: CCN
Type: SECTRACK ID: 1017315
NetWare Client Print Provider Buffer Overflows in EnumPrinters() and OpenPrinter() Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1017315

Source: CCN
Type: Novell Technical Information Document TID2974765
Novell Client 4.91 Post-SP3 NWSPOOL.DLL

Source: CONFIRM
Type: UNKNOWN
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm

Source: CCN
Type: US-CERT VU#300636
Novell NetWare Client for Windows OpenPrinter() function vulnerable to buffer overflow

Source: CERT-VN
Type: US Government Resource
VU#300636

Source: CCN
Type: US-CERT VU#653076
Novell NetWare Client for Windows EnumPrinters() function vulnerable to buffer overflow

Source: CERT-VN
Type: US Government Resource
VU#653076

Source: CCN
Type: Novell Technical Information Document TID3125538
nwspool.dll buffer overflow

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.novell.com/support/search.do?cmd=displayKC&externalId=3125538&sliceId=SAL_Public

Source: CCN
Type: OSVDB ID: 30547
Novell NetWare Client Print Provider (nwspool.dll) Multiple Function Overflow

Source: CCN
Type: OSVDB ID: 37321
Novell NetWare Client NWSPOOL.DLL RPC Printer Functions Remote Overflow

Source: CCN
Type: OSVDB ID: 38119
DiskAccess NFS Client dapcnfsd.dll EnumPrintersA function Remote Overflow

Source: BUGTRAQ
Type: UNKNOWN
20061129 ZDI-06-043: Novell Netware Client Print Provider Buffer Overflow Vulnerability

Source: BID
Type: UNKNOWN
21220

Source: CCN
Type: BID-21220
Novell Client NWSPOOL.DLL Remote Buffer Overflow Vulnerability

Source: MISC
Type: UNKNOWN
http://www.securityfocus.com/data/vulnerabilities/exploits/testlpc.c

Source: VUPEN
Type: UNKNOWN
ADV-2006-4631

Source: MISC
Type: Patch, Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-06-043.html

Source: XF
Type: UNKNOWN
novell-nwspool-bo(30461)

Source: XF
Type: UNKNOWN
novell-nwspool-bo(30461)

Source: CCN
Type: ZDI-06-043
Novell Netware Client Print Provider Buffer Overflow Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:netware_client:4.91:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_client:4.91:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_client:4.91:sp2:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:netware_client:4.91:*:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_client:4.91:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:netware_client:4.91:sp2:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell netware client 4.91
    novell netware client 4.91 sp1
    novell netware client 4.91 sp2
    novell netware client 4.91
    novell netware client 4.91 sp1
    novell netware client 4.91 sp2