1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. RPC Novell Client nwspool EnumPrinters BO

RPC Novell Client nwspool EnumPrinters BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a stack overflow vulnerability in Novell Client.

Additional Information

A stack overflow vulnerability exists in Novell Clients while handling RPC requests. A remote attacker may exploit this issue to execute arbitrary code with SYSTEM-level privileges, facilitating the compromise of affected computers. Failed exploit attempts will likely crash the application, denying service to legitimate users.

Affected

  • Novell Client 4.91 SP2, 4.91 SP3

Response

Download and install all vendor patched related to this issue.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube