[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253650

 
 

909

 
 

197367

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-2304Date: (C)2006-05-11   (M)2023-12-22


Multiple integer overflows in the DPRPC library (DPRPCW32.DLL) in Novell Client 4.83 SP3, 4.90 SP2 and 4.91 SP2 allow remote attackers to execute arbitrary code via an XDR encoded array with a field that specifies a large number of elements, which triggers the overflows in the ndps_xdr_array function. NOTE: this was originally reported to be a buffer overflow by Novell, but the original cause is an integer overflow.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
SECTRACK-1016052
BID-17931
SECUNIA-20048
http://www.securityfocus.com/archive/1/434017/100/0/threaded
OSVDB-25429
ADV-2006-1759
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973719.htm
http://www.hustlelabs.com/novell_ndps_advisory.pdf
novell-ndps-overflow(26314)

CPE    2
cpe:/a:novell:client:4.91:sp2
cpe:/a:novell:client:4.83:sp3

© SecPod Technologies