First published: Fri Feb 25 2011(Updated: )
The xdrDecodeString function in XNFS.NLM in Novell Netware 6.5 before SP8 allows remote attackers to cause a denial of service (abend) or execute arbitrary code via a crafted, signed value in a NFS RPC request to port UDP 1234, leading to a stack-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell NetWare | =6.5 | |
Novell NetWare | =6.5-sp1 | |
Novell NetWare | =6.5-sp4 | |
Novell NetWare | <=6.5 | |
Novell NetWare | =6.5-sp2 | |
Novell NetWare | =6.5-sp6 | |
Novell NetWare | =6.5-sp3 | |
Novell NetWare | =6.5-sp5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4227 has a high severity due to its potential to cause denial of service and arbitrary code execution.
To fix CVE-2010-4227, upgrade Novell NetWare to version 6.5 service pack 8 or later.
CVE-2010-4227 can be exploited via crafted NFS RPC requests sent to port UDP 1234.
CVE-2010-4227 affects Novell NetWare 6.5 versions up to service pack 7.
CVE-2010-4227 represents a stack-based buffer overflow vulnerability leading to potential code execution.