First published: Fri May 12 2006(Updated: )
Multiple integer overflows in the DPRPC library (DPRPCNLM.NLM) NDPS/iPrint module in Novell Distributed Print Services in Novell NetWare 6.5 SP3, SP4, and SP5 allow remote attackers to execute arbitrary code via an XDR encoded array with a field that specifies a large number of elements, which triggers the overflows in the ndps_xdr_array function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell NetWare | =6.5-sp3 | |
Novell NetWare | =6.5-sp1 | |
Novell NetWare | =6.5-sp2 | |
Novell NetWare | =6.5-sp1.1a | |
Novell NetWare | =6.5-sp4 | |
Novell NetWare | =6.5-sp1.1b | |
Novell NetWare | =6.5-sp5 | |
Novell NetWare | =6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2327 has a high severity rating due to its potential to allow remote attackers to execute arbitrary code.
To fix CVE-2006-2327, upgrade to a patched version of Novell NetWare that addresses this vulnerability.
CVE-2006-2327 affects Novell NetWare versions 6.5 SP1 through SP5.
CVE-2006-2327 is categorized as an integer overflow vulnerability.
Yes, CVE-2006-2327 can be exploited remotely by attackers through specially crafted data.