VID |
28173 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Novell Client software has a buffer overflow vulnerability in the 'dprpcw32.dll' library. Novell Client for Windows is vulnerable to a buffer overflow attack, caused by improper bounds checking in the ndps_xdr_array() function in the Novell Distributed Print Services (NDPS) DPRPC library (dprpcw32.dll). By sending a specially-crafted request to a system running NDPS, iPrint, or iManager using the iPrint plugins, a remote attacker could overflow a buffer and execute arbitraty code on the affected system or cause the system to crash.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973719.htm http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046048.html http://www.hustlelabs.com/novell_ndps_advisory.pdf http://www.frsirt.com/english/advisories/2006/1759 http://secunia.com/advisories/20048/
* Platforms Affected: Novell Client 4.83 SP3, 4.90 SP2 and 4.91 SP2 Microsoft Windows Any version |
Recommendation |
Install the 491psp2_dprpcw32.exe beta patch file, as listed in the Novell Technical Information Document TID2973719 at http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973719.htm |
Related URL |
CVE-2006-2304 (CVE) |
Related URL |
17931 (SecurityFocus) |
Related URL |
26314 (ISS) |
|