Korean
<< Back
VID 28173
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Novell Client software has a buffer overflow vulnerability in the 'dprpcw32.dll' library. Novell Client for Windows is vulnerable to a buffer overflow attack, caused by improper bounds checking in the ndps_xdr_array() function in the Novell Distributed Print Services (NDPS) DPRPC library (dprpcw32.dll). By sending a specially-crafted request to a system running NDPS, iPrint, or iManager using the iPrint plugins, a remote attacker could overflow a buffer and execute arbitraty code on the affected system or cause the system to crash.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973719.htm
http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046048.html
http://www.hustlelabs.com/novell_ndps_advisory.pdf
http://www.frsirt.com/english/advisories/2006/1759
http://secunia.com/advisories/20048/

* Platforms Affected:
Novell Client 4.83 SP3, 4.90 SP2 and 4.91 SP2
Microsoft Windows Any version
Recommendation Install the 491psp2_dprpcw32.exe beta patch file, as listed in the Novell Technical Information Document TID2973719 at http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973719.htm
Related URL CVE-2006-2304 (CVE)
Related URL 17931 (SecurityFocus)
Related URL 26314 (ISS)