In association with heise online

12 February 2008, 15:14

Security update for Novell Client

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

TippingPoint has identified a security vulnerability in Novell Client that could allow a remote attacker to take control of a PC. The cause of the problem is a buffer overflow in the function EnumPrinter in the printer spooler (NWSPOOL.DLL). Specific RPC requests can provoke an overflow allowing an attacker to execute code and obtain system rights. Authentication is not required to exploit this vulnerability. Products affected are Novell Client 4.91 SP2, SP3 and SP4 for Windows 2000/XP/2003. The manufacturer has made an update available.

See also:

(ehe)

Print Version | Send by email | Permalink: http://h-online.com/-734191
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit