First published: Wed Feb 13 2008(Updated: )
Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP4 for Windows allow remote attackers to execute arbitrary code via long arguments to multiple unspecified RPC functions, aka Novell bug 287919, a different vulnerability than CVE-2007-2954.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows | ||
Novell Client | =4.91-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6701 has a high severity rating due to its potential for remote code execution.
To fix CVE-2007-6701, upgrade to the latest version of Novell Client or apply the security patches provided by Novell.
CVE-2007-6701 specifically affects Novell Client version 4.91 SP4 on Windows environments.
Yes, CVE-2007-6701 can be exploited remotely through long arguments passed to various RPC functions.
Exploitation of CVE-2007-6701 could allow an attacker to execute arbitrary code on the affected system.