First published: Sun Dec 10 2006(Updated: )
Buffer overflow in the Novell Distributed Print Services (NDPS) Print Provider for Windows component (NDPPNT.DLL) in Novell Client 4.91 has unknown impact and remote attack vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Client | =4.91 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-6443 is currently classified as high due to the buffer overflow vulnerability which can be exploited remotely.
To fix CVE-2006-6443, it is recommended to upgrade to a newer version of the Novell Client beyond version 4.91.
CVE-2006-6443 has an unknown but potentially serious impact due to the nature of the buffer overflow.
Yes, CVE-2006-6443 can be exploited remotely, putting systems at risk.
CVE-2006-6443 specifically affects Novell Client version 4.91.