From patrik.karlsson@se.pwcglobal.com Thu May 9 02:47:27 2002 From: Patrik Karlsson To: vulnwatch@vulnwatch.org Date: Wed, 8 May 2002 12:09:10 +0200 Subject: [VulnWatch] cqure.net.20020412.netware_client.a [The following text is in the "iso-8859-1" character set] [Your display is set for the "US-ASCII" character set] [Some characters may be displayed incorrectly] cqure.net Security Vulnerability Report No: cqure.net.20020412.netware_client.a ======================================== Vulnerability Summary --------------------- Problem: Multiple buffer overflow conditions exist in the Novell Netware client for Windows. Threat: An attacker could crash any software relying on name resolution, like ping, traceroute, rexec and rsh. Affected Software: Novell Netware Client 4.83. Platform: Windows 2000/XP verified. Vulnerability Description ------------------------- If one would run the command ping with a long hostname an access violation would occur. Depending on the length of the hostname the program will crash in different locations. This might be interesting in a WTS or Citrix environment. We have looked very briefly at the problem and therefore can't comment on the impact of this issue. Solution -------- Install patch from Novell as soon as it becomes available. Additional Information ---------------------- Novell was contacted 20020412. This vulnerability was found and researched by Patrik Karlsson & Jonas Ländin patrik.karlsson@se.pwcglobal.com jonas.landin@ixsecurity.com This document is also available at: http://www.cqure.net/advisories/