|
|
| |
Credit:
The information has been provided by The Zero Day Initiative (ZDI).
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-08-005.html
|
| |
Vulnerable Systems:
* Novell Client version 4.91 SP2
* Novell Client version 4.91 SP3
* Novell Client version 4.91 SP4
The specific flaw exists in nwspool.dll which is responsible for handling RPC requests through the spoolss named pipe. The EnumPrinters function exposed by this DLL contains a logical flaw allowing an attacker to bypass a patch introduced to prevent the vulnerability described in ZDI-07-045. Exploitation of this vulnerability leads to arbitrary code execution in the context of the SYSTEM user.
Vendor Response:
Novell has issued an update to correct this vulnerability. More details can be found at: http://download.novell.com/Download?buildid=SszG22IIugM~
Disclosure Timeline:
2007.12.11 - Vulnerability reported to vendor
2008.02.11 - Coordinated public release of advisory
CVE Information:
CVE-2008-0639
|
|
|