Novell Client nwspool.dll RPC Printer Functions Remote Overflow (300870)

critical Nessus Plugin ID 25952

Synopsis

The remote Windows host contains a DLL that is affected by multiple buffer overflow vulnerabilities.

Description

The file 'nwspool.dll' included with the Novell Client software on the remote host reportedly contains several buffer overflow vulnerabilities that can be triggered via specially crafted RPC requests. An unauthenticated, remote attacker may be able to leverage these issues with overly long arguments to RPC requests such as 'RpcAddPrinterDriver' and 'RpcGetPrinterDriverDirectory' to cause a denial of service or to execute arbitrary code remotely on the affected host.

Solution

Install the 491psp2_3_4_nwspool.zip Field Test File per the vendor advisory referenced above.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2007-57/advisory/

http://download.novell.com/Download?buildid=VOXNZb-6t_g~

Plugin Details

Severity: Critical

ID: 25952

File Name: novell_nwspool_bug300870.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 8/30/2007

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/28/2007

Vulnerability Publication Date: 8/29/2007

Exploitable With

CANVAS (CANVAS)

Reference Information

CVE: CVE-2007-2954

BID: 25474

CWE: 119