First published: Sun Dec 03 2006(Updated: )
Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 through 4.91 SP2 allow remote attackers to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Client | =4.91 | |
Novell Client | =4.91-sp1 | |
Novell Client | =4.91-sp2 | |
=4.91 | ||
=4.91-sp1 | ||
=4.91-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5854 is classified as a critical vulnerability due to potential remote code execution allowing attackers to exploit buffer overflows.
To mitigate CVE-2006-5854, update your Novell Netware Client to version 4.91 SP3 or later, which addresses these buffer overflow vulnerabilities.
The affected versions for CVE-2006-5854 include Novell Netware Client 4.91, 4.91 SP1, and 4.91 SP2.
The vulnerable functions in CVE-2006-5854 are EnumPrinters and OpenPrinter, which can be exploited through overly long arguments.
Yes, CVE-2006-5854 can lead to data loss as it allows remote attackers to execute arbitrary code, potentially compromising system integrity.