[Forgot Password]
Login  Register Subscribe

24003

 
 

131401

 
 

103942

 
 

909

 
 

84051

 
 

133

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2007-2954Date: (C)2007-08-31   (M)2018-02-19


Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2 through SP4 for Windows allow remote attackers to execute arbitrary code via certain long arguments to the (1) RpcAddPrinterDriver, (2) RpcGetPrinterDriverDirectory, and other unspecified RPC requests, aka Novell bug 300870, a different vulnerability than CVE-2006-5854.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 10.0
Exploit Score: Exploit Score: 10.0
Impact Score: Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: COMPLETE
Scope: Integrity: COMPLETE
Confidentiality: Availability: COMPLETE
Integrity:  
Availability:  
  
Reference:
SECTRACK-1018623
BID-25474
SECUNIA-26374
OSVDB-37321
ADV-2007-3006
http://download.novell.com/Download?buildid=VOXNZb-6t_g~
http://secunia.com/secunia_research/2007-57/advisory/
http://www.zerodayinitiative.com/advisories/ZDI-07-045/
novell-client-nwspool-bo(35824)

CPE    3
cpe:/a:novell:client:4.91:sp4
cpe:/a:novell:client:4.91:sp3
cpe:/a:novell:client:4.91:sp2
CWE    1
CWE-119

© 2013 SecPod Technologies