--%> SecPod SCAP Repo, a repository of SCAP Content (CVE, CCE, CPE, CWE, OVAL and XCCDF)
[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-2954

Date: (C)2007-08-31   (M)2017-08-01
 
CVSS Score: 10.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2 through SP4 for Windows allow remote attackers to execute arbitrary code via certain long arguments to the (1) RpcAddPrinterDriver, (2) RpcGetPrinterDriverDirectory, and other unspecified RPC requests, aka Novell bug 300870, a different vulnerability than CVE-2006-5854.

Reference:
SECTRACK-1018623
BID-25474
SECUNIA-26374
OSVDB-37321
ADV-2007-3006
http://download.novell.com/Download?buildid=VOXNZb-6t_g~
http://secunia.com/secunia_research/2007-57/advisory/
http://www.zerodayinitiative.com/advisories/ZDI-07-045/
novell-client-nwspool-bo(35824)

CPE    3
cpe:/a:novell:client:4.91:sp4
cpe:/a:novell:client:4.91:sp3
cpe:/a:novell:client:4.91:sp2
CWE    1
CWE-119

© 2013 SecPod Technologies