First published: Mon May 12 2008(Updated: )
Stack-based buffer overflow in Novell Client 4.91 SP4 and earlier allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long username in the "forgotten password" dialog.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell NetWare Client | =4.91-sp3 | |
Novell NetWare Client | =4.91-sp4 | |
Novell NetWare Client | =4.91-sp1 | |
Novell NetWare Client | =4.91-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2145 is classified as a high severity vulnerability due to its potential to cause denial of service and execute arbitrary code.
To mitigate CVE-2008-2145, upgrade to Novell Client version 4.91 SP5 or later.
CVE-2008-2145 affects Novell Client versions 4.91 SP1, SP2, SP3, and SP4.
Exploiting CVE-2008-2145 may lead to a denial of service by crashing the application and potentially executing arbitrary code.
CVE-2008-2145 can be exploited by local users who have access to the Novell Client interface.