Vulnerability Details : CVE-2006-5854
Multiple buffer overflows in the Spooler service (nwspool.dll) in Novell Netware Client 4.91 through 4.91 SP2 allow remote attackers to execute arbitrary code via a long argument to the (1) EnumPrinters and (2) OpenPrinter functions.
Vulnerability category: Execute code
Products affected by CVE-2006-5854
- cpe:2.3:a:novell:netware_client:4.91:*:*:*:*:*:*:*
- cpe:2.3:a:novell:netware_client:4.91:sp1:*:*:*:*:*:*
- cpe:2.3:a:novell:netware_client:4.91:sp2:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-5854
93.33%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-5854
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2006-5854
-
http://www.securityfocus.com/data/vulnerabilities/exploits/testlpc.c
-
http://www.securityfocus.com/archive/1/453012/100/0/threaded
-
http://www.kb.cert.org/vuls/id/653076
US Government Resource
-
http://www.kb.cert.org/vuls/id/300636
US Government Resource
-
http://www.zerodayinitiative.com/advisories/ZDI-06-043.html
Patch;Vendor Advisory
-
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974765.htm
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30461
-
http://www.vupen.com/english/advisories/2006/4631
-
http://www.novell.com/support/search.do?cmd=displayKC&externalId=3125538&sliceId=SAL_Public
Patch;Vendor Advisory
-
http://securitytracker.com/id?1017263
-
http://securitytracker.com/id?1017315
-
http://www.securityfocus.com/bid/21220
Jump to