First published: Tue Dec 31 2002(Updated: )
Buffer overflow in Novell NetWare Client 4.80 through 4.83 allows local users to cause a denial of service (crash) by using ping, traceroute, or a similar utility to force the client to resolve a large hostname.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Client | =4.81 | |
Novell Client | =4.83 | |
Novell Client | =4.80 | |
Novell Client | =4.82 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1754 is considered a high-severity vulnerability due to its ability to cause denial of service.
To fix CVE-2002-1754, update to a non-vulnerable version of Novell NetWare Client, specifically versions 4.84 or later.
Local users of Novell NetWare Client versions 4.80 through 4.83 are affected by CVE-2002-1754.
CVE-2002-1754 is caused by a buffer overflow triggered by the client attempting to resolve large hostnames.
The impact of CVE-2002-1754 is a potential denial of service, causing the affected software to crash.