Novell.Netware.Client.Print.Provider.Buffer.Overflow
Description
This indicates an attempt to exploit a buffer-overflow vulnerability in a print provider installed by Novell Netware Client.
The vulnerability is in the nwspool.dll library's failure to properly handle overly long arguments to the EnumPrinters() and OpenPrinter() functions. A remote attacker may exploit this to execute arbitrary code.
Affected Products
Novell Netware Client 4.91
Novell Netware Client 4.91 SP1
Novell Netware Client 4.91 SP2
Impact
System compromise: Arbitrary code execution.
Recommended Actions
Apply the update issued by the vendor:
http://www.novell.com/support/search.do?cmd=displayKC&externalId=3125538&sliceId=SAL_Public
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |