Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Stack-based buffer overflow in the EnumPrinters function in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2, SP3, and SP4 for Windows allows remote attackers to execute arbitrary code via a crafted RPC request, aka Novell bug 353138, a different vulnerability than CVE-2006-5854. NOTE: this issue exists because of an incomplete fix for CVE-2007-6701.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Novell客户端 nwspool.dll EnumPrinters RPC请求 远程栈溢出漏洞
Vulnerability Description
Novell Client是美国Novell公司的一套可将NetWare连接到Windows的工作站软件。 Novell Client的Spooler服务(nwspool.dll)负责处理通过spoolss命名管道所提交的RPC请求,该DLL所暴露的EnumPrinters函数存在逻辑错误,允许远程攻击者通过提交恶意的RPC请求触发栈溢出,导致执行任意指令。 出现这个漏洞是由于没有正确地修复CVE-2007-6701漏洞。
CVSS Information
N/A
Vulnerability Type
N/A