Novell

Client

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.53%
  • Veröffentlicht 10.12.2006 20:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in the Novell Distributed Print Services (NDPS) Print Provider for Windows component (NDPPNT.DLL) in Novell Client 4.91 has unknown impact and remote attack vectors.

  • EPSS 0.08%
  • Veröffentlicht 05.12.2006 11:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Format string vulnerability in Novell Modular Authentication Services (NMAS) in the Novell Client 4.91 SP2 and SP3 allows users with physical access to read stack and memory contents via format string specifiers in the Username field of the logon win...

  • EPSS 1.57%
  • Veröffentlicht 05.12.2006 11:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

srvloc.sys in Novell Client for Windows before 4.91 SP3 allows remote attackers to cause an unspecified denial of service via a crafted packet to port 427 that triggers an access of pageable or invalid addresses using a higher interrupt request level...

  • EPSS 0.08%
  • Veröffentlicht 26.05.2006 01:06:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Novell Client for Windows 4.8 and 4.9 does not restrict access to the clipboard contents while a machine is locked, which allows users with physical access to read the current clipboard contents by pasting them into the "User Name" field on the login...

  • EPSS 13.23%
  • Veröffentlicht 11.05.2006 10:02:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Multiple integer overflows in the DPRPC library (DPRPCW32.DLL) in Novell Client 4.83 SP3, 4.90 SP2 and 4.91 SP2 allow remote attackers to execute arbitrary code via an XDR encoded array with a field that specifies a large number of elements, which tr...

  • EPSS 0.43%
  • Veröffentlicht 20.10.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Norton AntiVirus 5.00.01C with the Novell Netware client does not properly restart the auto-protection service after the first user has logged off of the system.