ID CVE-2006-6114 Type cve Reporter NVD Modified 2008-09-10T16:37:42
Description
REJECT DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-5854. Reason: This candidate is a duplicate of CVE-2006-5854. Notes: All CVE users should reference CVE-2006-5854 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
{"href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-6114", "history": [], "references": [], "lastseen": "2016-09-03T07:54:47", "bulletinFamily": "NVD", "title": "CVE-2006-6114", "cpe": [], "viewCount": 0, "id": "CVE-2006-6114", "hash": "ba0a1036c723709664e1e016d3727289b0b791bf1a3af8e10da002ee04ec7e7a", "description": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-5854. Reason: This candidate is a duplicate of CVE-2006-5854. Notes: All CVE users should reference CVE-2006-5854 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.", "edition": 1, "assessment": {"name": "", "href": "", "system": ""}, "cvelist": ["CVE-2006-6114"], "scanner": [], "modified": "2008-09-10T16:37:42", "cvss": {"score": 0.0, "vector": "NONE"}, "objectVersion": "1.2", "reporter": "NVD", "type": "cve", "published": "2006-11-26T17:07:00", "enchantments": {"score": {"value": 5.0, "vector": "NONE", "modified": "2016-09-03T07:54:47"}, "dependencies": {"references": [{"type": "cert", "idList": ["VU:653076"]}], "modified": "2016-09-03T07:54:47"}, "vulnersScore": 5.0}}
{"cert": [{"lastseen": "2018-12-25T20:18:54", "bulletinFamily": "info", "description": "### Overview \n\nA vulnerability exists in the Novell NetWare client that could allow a remote attacker to execute arbitrary code on an affected system.\n\n### Description \n\n[NetWare](<http://www.novell.com/products/netware/>) is a network operating system produced and maintained by Novell. Novell provides NetWare clients for Microsoft Windows and Linux operating systems.\n\nFrom the [Novell Client for Windows XP/2000](<http://www.novell.com/products/clients/windows/xp2000/overview.html>) product overview: \n_ It enables you to access NetWare\u00ae services from Windows XP or 2000 workstations or servers and tightly integrates either product into your NetWare network. For example, with Novell Client for Windows XP/2000, you can browse through authorized NetWare directories, transfer files, print documents and use advanced NetWare services directly from a Windows XP or 2000 workstation._ \nThe `nwspool.dll` library is included with the Novell Client for Windows, and provides access to remote printing services. \n \nThere is a buffer overflow vulnerability in the `EnumPrinters()` function which is used in the `nwspool.dll` library. An attacker may be able to trigger the overflow by sending specially-crafted Remote Procedure Call (RPC) requests to the Spooler service on a vulnerable system. \n \n--- \n \n### Impact \n\nA remote unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. \n \n--- \n \n### Solution \n\n**Upgrade** \nNovell has issued a beta upgrade that addresses this issue. See Novell Technical Information Document [TID2974765](<http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm>) for more details. \n \n--- \n \n### Vendor Information\n\n653076\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Vendor has issued information\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n__ Affected __ Unknown __ Unaffected \n\n**Javascript is disabled. Click here to view vendors.**\n\n### __ Novell, Inc. \n\nUpdated: December 19, 2006 \n\n### Status\n\n__ Vulnerable\n\n### Vendor Statement\n\nNo statement is currently available from the vendor regarding this vulnerability.\n\n### Vendor Information\n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nSee <https://secure-support.novell.com/KanisaPlatform/Publishing/583/3125538_f.SAL_Public.html> for more details.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23653076 Feedback>).\n\n \n\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | N/A | N/A \nTemporal | N/A | N/A \nEnvironmental | | N/A \n \n \n\n\n### References \n\n * <http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm>\n * <http://secunia.com/advisories/23027/>\n * <https://secure-support.novell.com/KanisaPlatform/Publishing/583/3125538_f.SAL_Public.html>\n * <http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm>\n\n### Credit\n\nThe Zero Day Initiative disclosed this vulnerability. \n\nThis document was written by Ryan Giobbi. \n\n### Other Information\n\n**CVE IDs:** | [CVE-2006-6114](<http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-6114>) \n---|--- \n**Severity Metric:****** | 6.63 \n**Date Public:** | 2006-11-21 \n**Date First Published:** | 2006-12-19 \n**Date Last Updated: ** | 2006-12-20 00:27 UTC \n**Document Revision: ** | 28 \n", "modified": "2006-12-20T00:27:00", "published": "2006-12-19T00:00:00", "id": "VU:653076", "href": "https://www.kb.cert.org/vuls/id/653076", "type": "cert", "title": "Novell NetWare Client for Windows EnumPrinters() function vulnerable to buffer overflow", "cvss": {"score": 0.0, "vector": "NONE"}}]}