First published: Wed Nov 14 2007(Updated: )
NWFILTER.SYS in Novell Client 4.91 SP 1 through SP 4 for Windows 2000, XP, and Server 2003 makes the \.\nwfilter device available for arbitrary user-mode input via METHOD_NEITHER IOCTLs, which allows local users to gain privileges by passing a kernel address as an argument and overwriting kernel memory locations.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | ||
Microsoft Windows 2000 | ||
Microsoft Windows 2000 | ||
Microsoft Windows 2000 | ||
Microsoft Windows 2000 | ||
Microsoft Windows 2000 | ||
Microsoft Windows Server 2003 | ||
Microsoft Windows Server 2003 | ||
Microsoft Windows Server 2003 | ||
Microsoft Windows Server 2003 | ||
Microsoft Windows Server 2003 | ||
Microsoft Windows Server 2003 | ||
Microsoft Windows Server 2003 | ||
Microsoft Windows Server | ||
Microsoft Windows XP | ||
Microsoft Windows XP | ||
Microsoft Windows XP | ||
Microsoft Windows XP | ||
Microsoft Windows XP | ||
Microsoft Windows XP | ||
Microsoft Windows XP | ||
Microsoft Windows XP | ||
Novell NetWare Client | =4.91-sp1 | |
Novell NetWare Client | =4.91-sp2 | |
Novell NetWare Client | =4.91-sp3 | |
Novell NetWare Client | =4.91-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5667 has a medium severity level, as it allows local users to gain elevated privileges through inappropriate access to the NWFILTER.SYS driver.
To fix CVE-2007-5667, ensure you have upgraded to the latest version of Novell Client that addresses this vulnerability.
The vulnerability affects systems running Novell Client versions 4.91 SP 1 through SP 4 on Microsoft Windows 2000, XP, and Server 2003.
Exploiting CVE-2007-5667 could allow an attacker to execute arbitrary code in kernel mode, potentially leading to system compromise.
CVE-2007-5667 was disclosed in 2007 and is associated with local privilege escalation vulnerabilities.