7.8 High
AI Score
Confidence
Low
10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.773 High
EPSS
Percentile
98.1%
Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2 through SP4 for Windows allow remote attackers to execute arbitrary code via certain long arguments to the (1) RpcAddPrinterDriver, (2) RpcGetPrinterDriverDirectory, and other unspecified RPC requests, aka Novell bug 300870, a different vulnerability than CVE-2006-5854.
download.novell.com/Download?buildid=VOXNZb-6t_g~
osvdb.org/37321
secunia.com/advisories/26374
secunia.com/secunia_research/2007-57/advisory/
securitytracker.com/id?1018623
www.securityfocus.com/bid/25474
www.vupen.com/english/advisories/2007/3006
www.zerodayinitiative.com/advisories/ZDI-07-045/
exchange.xforce.ibmcloud.com/vulnerabilities/35824