| Vulnerability Name: | CVE-2008-0639 (CCN-40431) | ||||||||
| Assigned: | 2008-02-11 | ||||||||
| Published: | 2008-02-11 | ||||||||
| Updated: | 2018-10-15 | ||||||||
| Summary: | Stack-based buffer overflow in the EnumPrinters function in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2, SP3, and SP4 for Windows allows remote attackers to execute arbitrary code via a crafted RPC request, aka Novell bug 353138, a different vulnerability than CVE-2006-5854. Note: this issue exists because of an incomplete fix for CVE-2007-6701. | ||||||||
| CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
| CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-119 | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2008-0639 Source: CONFIRM Type: Patch http://download.novell.com/Download?buildid=SszG22IIugM~ Source: CCN Type: Novell Technical Information Document ID: 5008300 Novell Client 4.91 Post-SP2/3/4 NWSPOOL.DLL 2 Source: FULLDISC Type: Patch 20080211 ZDI-08-005: Novell Client NWSPOOL.DLL EnumPrinters Stack Overflow Vulnerability Source: CCN Type: SA28895 Novell Client NWSPOOL.DLL "EnumPrinters()" Buffer Overflow Source: SECUNIA Type: Patch, Vendor Advisory 28895 Source: CCN Type: SECTRACK ID: 1019366 Novell Client NWSPOOL.DLL Stack Overflow in EnumPrinters() Let Remote Users Execute Arbitrary Code Source: CONFIRM Type: UNKNOWN http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5008300.html Source: CCN Type: OSVDB ID: 41510 Novell Client NWSPOOL.DLL EnumPrinters() Function Remote Overflow Source: BUGTRAQ Type: UNKNOWN 20080211 ZDI-08-005: Novell Client NWSPOOL.DLL EnumPrinters Stack Overflow Vulnerability Source: BID Type: Patch 27741 Source: CCN Type: BID-27741 Novell Client 'nwspool.dll' EnumPrinters RPC Request Buffer Overflow Vulnerability Source: SECTRACK Type: UNKNOWN 1019366 Source: VUPEN Type: UNKNOWN ADV-2008-0496 Source: MISC Type: Patch http://www.zerodayinitiative.com/advisories/ZDI-08-005.html Source: XF Type: UNKNOWN novell-enumprinters-bo(40431) Source: CCN Type: ZDI-08-005 Novell Client NWSPOOL.DLL EnumPrinters Stack Overflow Vulnerability | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||