Vulnerabilities > Novell

DATE CVE VULNERABILITY TITLE RISK
2008-02-13 CVE-2008-0639 Buffer Errors vulnerability in Novell Client 4.91
Stack-based buffer overflow in the EnumPrinters function in the Spooler service (nwspool.dll) in Novell Client 4.91 SP2, SP3, and SP4 for Windows allows remote attackers to execute arbitrary code via a crafted RPC request, aka Novell bug 353138, a different vulnerability than CVE-2006-5854.
network
low complexity
microsoft novell CWE-119
critical
10.0
2008-02-13 CVE-2007-6701 Buffer Errors vulnerability in Novell Client 4.91
Multiple stack-based buffer overflows in the Spooler service (nwspool.dll) in Novell Client 4.91 SP4 for Windows allow remote attackers to execute arbitrary code via long arguments to multiple unspecified RPC functions, aka Novell bug 287919, a different vulnerability than CVE-2007-2954.
network
low complexity
microsoft novell CWE-119
critical
10.0
2008-02-12 CVE-2008-0731 Permissions, Privileges, and Access Controls vulnerability in Novell Apparmor
The Linux kernel before 2.6.18.8-0.8 in SUSE openSUSE 10.2 does not properly handle failure of an AppArmor change_hat system call, which might allow attackers to trigger the unconfining of an apparmored task.
network
low complexity
linux suse novell CWE-264
7.5
2008-02-08 CVE-2008-0663 Unspecified vulnerability in Novell products
Novell Challenge Response Client (LCM) 2.7.5 and earlier, as used with Novell Client for Windows 4.91 SP4, allows users with physical access to a locked system to obtain contents of the clipboard by pasting the contents into the Challenge Question field.
local
low complexity
novell
2.1
2008-01-31 CVE-2008-0525 Link Following vulnerability in multiple products
PatchLink Update client for Unix, as used by Novell ZENworks Patch Management Update Agent for Linux/Unix/Mac (LUM) 6.2094 through 6.4102 and other products, allows local users to (1) truncate arbitrary files via a symlink attack on the /tmp/patchlink.tmp file used by the logtrimmer script, and (2) execute arbitrary code via a symlink attack on the /tmp/plshutdown file used by the rebootTask script.
local
low complexity
unix lumension-security novell CWE-59
4.6
2008-01-09 CVE-2007-5762 Improper Input Validation vulnerability in Novell Netware Client 4.91
NICM.SYS driver 3.0.0.4, as used in Novell NetWare Client 4.91 SP4, allows local users to execute arbitrary code by opening the \\.\nicm device and providing crafted kernel addresses via IOCTLs with the METHOD_NEITHER buffering mode.
local
low complexity
novell CWE-20
7.2
2008-01-09 CVE-2007-5665 Permissions, Privileges, and Access Controls vulnerability in Novell Zenworks Endpoint Security Management 3.5
STEngine.exe 3.5.0.20 in Novell ZENworks Endpoint Security Management (ESM) 3.5, and other ESM versions before 3.5.0.82, dynamically creates scripts in a world-writable directory when generating diagnostic reports, which allows local users to gain privileges, as demonstrated by creating a cmd.exe binary in the diagnostic report directory.
local
low complexity
novell CWE-264
7.2
2008-01-04 CVE-2007-6625 USE of Externally-Controlled Format String vulnerability in Novell Identity Manager 3.5.1
The Platform Service Process (asampsp) in Fan-Out Driver Platform Services for Novell Identity Manager (IDM) 3.5.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified network traffic that triggers a syslog message containing invalid format string specifiers, as demonstrated by a Nessus scan.
network
low complexity
novell CWE-134
5.0
2007-12-18 CVE-2007-6435 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Novell Groupwise
Stack-based buffer overflow in Novell GroupWise before 6.5.7, when HTML preview of e-mail is enabled, allows user-assisted remote attackers to execute arbitrary code via a long SRC attribute in an IMG element when forwarding or replying to a crafted e-mail.
network
novell CWE-119
critical
9.3
2007-12-10 CVE-2007-6302 Buffer Errors vulnerability in Novell Netmail 3.5.2
Multiple heap-based buffer overflows in avirus.exe in Novell NetMail 3.5.2 before Messaging Architects M+NetMail 3.52f (aka 3.5.2F) allows remote attackers to execute arbitrary code via unspecified ASCII integers used as memory allocation arguments, aka "ZDI-CAN-162."
network
novell CWE-119
6.8