| Vulnerability Name: | CVE-2006-5854 (CCN-30461) | ||||||||
| Assigned: | 2006-11-20 | ||||||||
| Published: | 2006-11-20 | ||||||||
| Updated: | 2018-10-17 | ||||||||
| Summary: | Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 through 4.91 SP2 allow remote attackers to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions. | ||||||||
| CVSS v3 Severity: | 9.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2006-5854 Source: MITRE Type: CNA CVE-2006-6114 Source: CCN Type: SA23027 Novell Client NWSPOOL.DLL Buffer Overflow Vulnerabilities Source: SECUNIA Type: UNKNOWN 23027 Source: CCN Type: SECTRACK ID: 1017263 Novell Client Buffer Overflow in NWSPOOL.DLL Has Unspecified Impact Source: SECTRACK Type: UNKNOWN 1017263 Source: CCN Type: SECTRACK ID: 1017315 NetWare Client Print Provider Buffer Overflows in EnumPrinters() and OpenPrinter() Let Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1017315 Source: CCN Type: Novell Technical Information Document TID2974765 Novell Client 4.91 Post-SP3 NWSPOOL.DLL Source: CONFIRM Type: UNKNOWN http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm Source: CCN Type: US-CERT VU#300636 Novell NetWare Client for Windows OpenPrinter() function vulnerable to buffer overflow Source: CERT-VN Type: US Government Resource VU#300636 Source: CCN Type: US-CERT VU#653076 Novell NetWare Client for Windows EnumPrinters() function vulnerable to buffer overflow Source: CERT-VN Type: US Government Resource VU#653076 Source: CCN Type: Novell Technical Information Document TID3125538 nwspool.dll buffer overflow Source: CONFIRM Type: Patch, Vendor Advisory http://www.novell.com/support/search.do?cmd=displayKC&externalId=3125538&sliceId=SAL_Public Source: CCN Type: OSVDB ID: 30547 Novell NetWare Client Print Provider (nwspool.dll) Multiple Function Overflow Source: CCN Type: OSVDB ID: 37321 Novell NetWare Client NWSPOOL.DLL RPC Printer Functions Remote Overflow Source: CCN Type: OSVDB ID: 38119 DiskAccess NFS Client dapcnfsd.dll EnumPrintersA function Remote Overflow Source: BUGTRAQ Type: UNKNOWN 20061129 ZDI-06-043: Novell Netware Client Print Provider Buffer Overflow Vulnerability Source: BID Type: UNKNOWN 21220 Source: CCN Type: BID-21220 Novell Client NWSPOOL.DLL Remote Buffer Overflow Vulnerability Source: MISC Type: UNKNOWN http://www.securityfocus.com/data/vulnerabilities/exploits/testlpc.c Source: VUPEN Type: UNKNOWN ADV-2006-4631 Source: MISC Type: Patch, Vendor Advisory http://www.zerodayinitiative.com/advisories/ZDI-06-043.html Source: XF Type: UNKNOWN novell-nwspool-bo(30461) Source: XF Type: UNKNOWN novell-nwspool-bo(30461) Source: CCN Type: ZDI-06-043 Novell Netware Client Print Provider Buffer Overflow Vulnerability | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||