First published: Tue Apr 12 2005(Updated: )
Unknown vulnerability in the TCP/IP functionality (TCPIP.NLM) in Novell Netware 6.x allows remote attackers to cause a denial of service (ABEND by Page Fault Processor Exception) via certain packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell NetWare | =6.5-sp3 | |
Novell NetWare | =6.5-sp1 | |
Novell NetWare | =6.0-sp3 | |
Novell NetWare | =6.5-sp2 | |
Novell NetWare | =6.0-sp1 | |
Novell NetWare | =6.0 | |
Novell NetWare | =6.5-sp1.1a | |
Novell NetWare | =6.5-sp1.1b | |
Novell NetWare | =6.0-sp2 | |
Novell NetWare | =6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1060 has a medium severity rating due to its ability to cause a denial of service in affected Novell Netware versions.
To fix CVE-2005-1060, it is recommended to upgrade to the latest service pack or patch provided by Novell for your version of Netware.
CVE-2005-1060 affects Novell Netware versions 6.0 and 6.5, specifically certain service packs like SP1 and SP3.
CVE-2005-1060 enables remote attackers to execute a denial of service attack, causing the system to crash due to a page fault processor exception.
While there is no official workaround for CVE-2005-1060, limiting external access to the affected systems may help mitigate the risk until an update is applied.