Vulnerability CVE-2007-2954


Published: 2007-08-31   Modified: 2012-02-12

Description:
Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2 through SP4 for Windows allow remote attackers to execute arbitrary code via certain long arguments to the (1) RpcAddPrinterDriver, (2) RpcGetPrinterDriverDirectory, and other unspecified RPC requests, aka Novell bug 300870, a different vulnerability than CVE-2006-5854.

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Novell -> Client 

 References:
http://www.securityfocus.com/bid/25474
http://securitytracker.com/id?1018623
http://secunia.com/secunia_research/2007-57/advisory/
http://secunia.com/advisories/26374
http://download.novell.com/Download?buildid=VOXNZb-6t_g
~
http://xforce.iss.net/xforce/xfdb/35824
http://www.zerodayinitiative.com/advisories/ZDI-07-045/
http://www.vupen.com/english/advisories/2007/3006
http://osvdb.org/37321

Copyright 2024, cxsecurity.com

 

Back to Top