First published: Fri Aug 31 2007(Updated: )
Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2 through SP4 for Windows allow remote attackers to execute arbitrary code via certain long arguments to the (1) RpcAddPrinterDriver, (2) RpcGetPrinterDriverDirectory, and other unspecified RPC requests, aka Novell bug 300870, a different vulnerability than CVE-2006-5854.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Client | =4.91-sp3 | |
Novell Client | =4.91-sp4 | |
Novell Client | =4.91-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2954 is considered a critical vulnerability due to the potential for remote code execution.
CVE-2007-2954 affects Novell Client versions 4.91 SP2 through SP4.
To mitigate CVE-2007-2954, users should upgrade to a patched version of Novell Client that addresses this vulnerability.
CVE-2007-2954 involves multiple stack-based buffer overflows in the Spooler service of Novell Client.
Yes, CVE-2007-2954 can be exploited remotely through certain malformed RPC requests.