CVE-2007-5667
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
14/11/2007
Last modified:
09/04/2025
Description
NWFILTER.SYS in Novell Client 4.91 SP 1 through SP 4 for Windows 2000, XP, and Server 2003 makes the \.\nwfilter device available for arbitrary user-mode input via METHOD_NEITHER IOCTLs, which allows local users to gain privileges by passing a kernel address as an argument and overwriting kernel memory locations.
Impact
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:microsoft:windows_2000:*:*:adv_srv:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:*:datacenter_srv:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:*:pro:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:*:srv:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:*:*:srv:ja:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2003_server:*:*:itanium:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2003_server:*:*:std:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2003_server:*:*:wed:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2003_server:*:*:x64:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2003_server:*:*:x64-std:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2003_server:*:*:xp-64bit:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_xp:*:*:64bit:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=626
- http://osvdb.org/40867
- http://secunia.com/advisories/27678
- http://www.securityfocus.com/bid/26420
- http://www.securitytracker.com/id?1018943=
- http://www.vupen.com/english/advisories/2007/3846
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38434
- https://secure-support.novell.com/KanisaPlatform/Publishing/98/3260263_f.SAL_Public.html
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=626
- http://osvdb.org/40867
- http://secunia.com/advisories/27678
- http://www.securityfocus.com/bid/26420
- http://www.securitytracker.com/id?1018943=
- http://www.vupen.com/english/advisories/2007/3846
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38434
- https://secure-support.novell.com/KanisaPlatform/Publishing/98/3260263_f.SAL_Public.html



