Novell Client 'SRVLOC.SYS'远程拒绝服务漏洞

漏洞信息详情

Novell Client 'SRVLOC.SYS'远程拒绝服务漏洞

漏洞简介

Novell Client是美国Novell公司的一套可将NetWare连接到Windows的工作站软件。

Novell Client在处理畸形请求报文时存在漏洞,远程攻击者可能利用此漏洞导致服务器拒绝服务。

如果向Novell Client的427端口发送了特制报文的话,就会导致srvloc.sys中出现以下拒绝服务情况:

IRQL_NOT_LESS_OR_EQUAL (a)

An attempt was made to access a pageable (or completely invalid) address at

an

interrupt request level (IRQL) that is too high. This is usually

caused by drivers using improper addresses.

If a kernel debugger is available get the stack backtrace.

Arguments:

Arg1: 00000006, memory referenced

Arg2: 00000002, IRQL

Arg3: 00000000, value 0 = read operation, 1 = write operation

Arg4: 804204bd, address which referenced memory

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://support.novell.com/security-alerts

参考网址

来源: secure-support.novell.com

链接:https://secure-support.novell.com/KanisaPlatform/Publishing/859/3480790_f.SAL_Public.html

来源: BID

名称: 21430

链接:http://www.securityfocus.com/bid/21430

来源: VUPEN

名称: ADV-2006-4840

链接:http://www.frsirt.com/english/advisories/2006/4840

来源: SECUNIA

名称: 23244

链接:http://secunia.com/advisories/23244

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享