Novell Client nwspool.dll EnumPrinters buffer overflow

2008-02-22T00:00:00
ID SAINT:3152BD756B1F7AA907C2AF6CBC357169
Type saint
Reporter SAINT Corporation
Modified 2008-02-22T00:00:00

Description

Added: 02/22/2008
CVE: CVE-2008-0639
BID: 27741
OSVDB: 41510

Background

Novell Client software provides NetWare connectivity to Windows platforms.

Problem

The **nwspool.dll** library in Novell Client is affected by a buffer overflow in the **EnumPrinters** function, allowing remote attackers to execute arbitrary commands by sending a specially crafted RPC request to the Spooler service.

Resolution

Apply Novell Client 4.91 Post-SP2/3/4 nwspool.dll 2.

References

<http://www.zerodayinitiative.com/advisories/ZDI-08-005.html>

Limitations

Exploit works on Novell Client for Windows 4.91 SP4 with the 4.91 Post-SP2/3/4 nwspool.dll 1 patch.

In order for the exploit to succeed against Windows Server 2003 targets, a shared printer must be configured, the login and password of an account with administrator privileges must be provided, and the Crypt::DES, Digest::MD4, and Digest::MD5 PERL modules must be installed. These modules are available from <http://cpan.org/modules/by-module/>.

Platforms

Windows 2000
Windows Server 2003