Novell Client nwspool.dll RPC Printer Functions Remote Overflow (300870)

Critical Nessus Plugin ID 25952


The remote Windows host contains a DLL that is affected by multiple buffer overflow vulnerabilities.


The file 'nwspool.dll' included with the Novell Client software on the remote host reportedly contains several buffer overflow vulnerabilities that can be triggered via specially crafted RPC requests. An unauthenticated, remote attacker may be able to leverage these issues with overly long arguments to RPC requests such as 'RpcAddPrinterDriver' and 'RpcGetPrinterDriverDirectory' to cause a denial of service or to execute arbitrary code remotely on the affected host.


Install the Field Test File per the vendor advisory referenced above.

See Also

Plugin Details

Severity: Critical

ID: 25952

File Name: novell_nwspool_bug300870.nasl

Version: $Revision: 1.16 $

Type: local

Agent: windows

Family: Windows

Published: 2007/08/30

Modified: 2015/01/12

Dependencies: 13855

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2007/08/28

Vulnerability Publication Date: 2007/08/29

Exploitable With


Reference Information

CVE: CVE-2007-2954

BID: 25474

OSVDB: 37321

CWE: 119