This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
The remote Windows host contains a DLL that is affected by multiple
buffer overflow vulnerabilities.
The file 'nwspool.dll' included with the Novell Client software on the
remote host reportedly contains several buffer overflow
vulnerabilities that can be triggered via specially crafted RPC
requests. An unauthenticated, remote attacker may be able to leverage
these issues with overly long arguments to RPC requests such as
'RpcAddPrinterDriver' and 'RpcGetPrinterDriverDirectory' to cause a
denial of service or to execute arbitrary code remotely on the
See also :
Install the 491psp2_3_4_nwspool.zip Field Test File per the vendor
advisory referenced above.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.8
Public Exploit Available : true