First published: Wed Feb 13 2008(Updated: )
Stack-based buffer overflow in the EnumPrinters function in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2, SP3, and SP4 for Windows allows remote attackers to execute arbitrary code via a crafted RPC request, aka Novell bug 353138, a different vulnerability than CVE-2006-5854. NOTE: this issue exists because of an incomplete fix for CVE-2007-6701.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows | ||
Novell Client | =4.91-sp2 | |
Novell Client | =4.91-sp3 | |
Novell Client | =4.91-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0639 is considered a critical vulnerability due to the potential for remote code execution.
To fix CVE-2008-0639, update the Novell Client to a version higher than 4.91 SP4.
CVE-2008-0639 affects Novell Client versions 4.91 SP2, SP3, and SP4.
Yes, CVE-2008-0639 can be exploited remotely via crafted RPC requests.
Exploitation of CVE-2008-0639 may allow attackers to execute arbitrary code on the affected system.