Check Point Advisories

Preemptive Protection against Novell Client Print Provider RPC Buffer Overflow Vulnerability

Check Point Reference: CPAI-2007-107
Date Published: 6 Sep 2007
Severity: Critical
Last Updated: Monday 01 January, 2007
Source: Secunia Advisory: SA26238
Protection Provided by:
Who is Vulnerable? Novell Client for Windows 4.91 SP4
Vulnerability Description A buffer overflow vulnerability has been discovered in Novell Client for Windows. The flaw is due to a boundary error in Novell Client's Spooler Service (nwspool.dll). The vulnerable service is included with the Novell Client for Microsoft Windows, and provides access to remote printing services via Remote Procedure Call (RPC). An attacker may exploit this vulnerability to execute arbitrary code on an affected system.
Update/Patch AvaliableApply patch:
Novell
Vulnerability DetailsThe vulnerability is due to an error in Novell Client's Spooler Service (nwspool.dll) that fails to properly handle long arguments passed in RPC requests. A remote attacker can exploit this issue by specially crafting a malicious RPC request and sending it to the Print Spooler RPC interface of an affected system. Successful exploitation may allow remote code execution.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK