CVE-2006-5854

Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 through 4.91 SP2 allow remote attackers to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions.
References
Link Resource
http://secunia.com/advisories/23027
http://securitytracker.com/id?1017263
http://securitytracker.com/id?1017315
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm
http://www.kb.cert.org/vuls/id/300636 US Government Resource
http://www.kb.cert.org/vuls/id/653076 US Government Resource
http://www.novell.com/support/search.do?cmd=displayKC&externalId=3125538&sliceId=SAL_Public Patch Vendor Advisory
http://www.securityfocus.com/archive/1/453012/100/0/threaded
http://www.securityfocus.com/bid/21220
http://www.securityfocus.com/data/vulnerabilities/exploits/testlpc.c
http://www.vupen.com/english/advisories/2006/4631
http://www.zerodayinitiative.com/advisories/ZDI-06-043.html Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/30461
http://secunia.com/advisories/23027
http://securitytracker.com/id?1017263
http://securitytracker.com/id?1017315
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm
http://www.kb.cert.org/vuls/id/300636 US Government Resource
http://www.kb.cert.org/vuls/id/653076 US Government Resource
http://www.novell.com/support/search.do?cmd=displayKC&externalId=3125538&sliceId=SAL_Public Patch Vendor Advisory
http://www.securityfocus.com/archive/1/453012/100/0/threaded
http://www.securityfocus.com/bid/21220
http://www.securityfocus.com/data/vulnerabilities/exploits/testlpc.c
http://www.vupen.com/english/advisories/2006/4631
http://www.zerodayinitiative.com/advisories/ZDI-06-043.html Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/30461
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:novell:netware_client:4.91:*:*:*:*:*:*:*
cpe:2.3:a:novell:netware_client:4.91:sp1:*:*:*:*:*:*
cpe:2.3:a:novell:netware_client:4.91:sp2:*:*:*:*:*:*

History

21 Nov 2024, 00:20

Type Values Removed Values Added
References () http://secunia.com/advisories/23027 - () http://secunia.com/advisories/23027 -
References () http://securitytracker.com/id?1017263 - () http://securitytracker.com/id?1017263 -
References () http://securitytracker.com/id?1017315 - () http://securitytracker.com/id?1017315 -
References () http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm - () http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm -
References () http://www.kb.cert.org/vuls/id/300636 - US Government Resource () http://www.kb.cert.org/vuls/id/300636 - US Government Resource
References () http://www.kb.cert.org/vuls/id/653076 - US Government Resource () http://www.kb.cert.org/vuls/id/653076 - US Government Resource
References () http://www.novell.com/support/search.do?cmd=displayKC&externalId=3125538&sliceId=SAL_Public - Patch, Vendor Advisory () http://www.novell.com/support/search.do?cmd=displayKC&externalId=3125538&sliceId=SAL_Public - Patch, Vendor Advisory
References () http://www.securityfocus.com/archive/1/453012/100/0/threaded - () http://www.securityfocus.com/archive/1/453012/100/0/threaded -
References () http://www.securityfocus.com/bid/21220 - () http://www.securityfocus.com/bid/21220 -
References () http://www.securityfocus.com/data/vulnerabilities/exploits/testlpc.c - () http://www.securityfocus.com/data/vulnerabilities/exploits/testlpc.c -
References () http://www.vupen.com/english/advisories/2006/4631 - () http://www.vupen.com/english/advisories/2006/4631 -
References () http://www.zerodayinitiative.com/advisories/ZDI-06-043.html - Patch, Vendor Advisory () http://www.zerodayinitiative.com/advisories/ZDI-06-043.html - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/30461 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/30461 -

Information

Published : 2006-12-03 19:28

Updated : 2024-11-21 00:20


NVD link : CVE-2006-5854

Mitre link : CVE-2006-5854

CVE.ORG link : CVE-2006-5854


JSON object : View

Products Affected

novell

  • netware_client