CVE-2006-5854
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/12/2006
Last modified:
09/04/2025
Description
Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 through 4.91 SP2 allow remote attackers to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:novell:netware_client:4.91:*:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netware_client:4.91:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:novell:netware_client:4.91:sp2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/23027
- http://securitytracker.com/id?1017263=
- http://securitytracker.com/id?1017315=
- http://support.novell.com/cgi-bin/search/searchtid.cgi?%2F2974765_htm=
- http://www.kb.cert.org/vuls/id/300636
- http://www.kb.cert.org/vuls/id/653076
- http://www.novell.com/support/search.do?cmd=displayKC&externalId=3125538&sliceId=SAL_Public
- http://www.securityfocus.com/archive/1/453012/100/0/threaded
- http://www.securityfocus.com/bid/21220
- http://www.securityfocus.com/data/vulnerabilities/exploits/testlpc.c
- http://www.vupen.com/english/advisories/2006/4631
- http://www.zerodayinitiative.com/advisories/ZDI-06-043.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30461
- http://secunia.com/advisories/23027
- http://securitytracker.com/id?1017263=
- http://securitytracker.com/id?1017315=
- http://support.novell.com/cgi-bin/search/searchtid.cgi?%2F2974765_htm=
- http://www.kb.cert.org/vuls/id/300636
- http://www.kb.cert.org/vuls/id/653076
- http://www.novell.com/support/search.do?cmd=displayKC&externalId=3125538&sliceId=SAL_Public
- http://www.securityfocus.com/archive/1/453012/100/0/threaded
- http://www.securityfocus.com/bid/21220
- http://www.securityfocus.com/data/vulnerabilities/exploits/testlpc.c
- http://www.vupen.com/english/advisories/2006/4631
- http://www.zerodayinitiative.com/advisories/ZDI-06-043.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30461