Show plain JSON{"id": "CVE-2006-2327", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.4, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2006-05-12T00:02:00.000", "references": [{"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046048.html", "source": "cve@mitre.org"}, {"url": "http://securitytracker.com/id?1016068", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973700.htm", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.hustlelabs.com/novell_ndps_advisory.pdf", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/25433", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/434017/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/17922", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2006/1740", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26314", "source": "cve@mitre.org"}, {"url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-May/046048.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securitytracker.com/id?1016068", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973700.htm", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.hustlelabs.com/novell_ndps_advisory.pdf", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.osvdb.org/25433", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/434017/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/17922", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2006/1740", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26314", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-189"}]}], "descriptions": [{"lang": "en", "value": "Multiple integer overflows in the DPRPC library (DPRPCNLM.NLM) NDPS/iPrint module in Novell Distributed Print Services in Novell NetWare 6.5 SP3, SP4, and SP5 allow remote attackers to execute arbitrary code via an XDR encoded array with a field that specifies a large number of elements, which triggers the overflows in the ndps_xdr_array function."}], "lastModified": "2025-04-03T01:03:51.193", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:novell:netware:6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D328A81E-DC60-4B67-B707-F0AD9A6F48E2"}, {"criteria": "cpe:2.3:o:novell:netware:6.5:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CEB9CEA-9245-490F-88F6-EFD23B11A19B"}, {"criteria": "cpe:2.3:o:novell:netware:6.5:sp1.1a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0669D0E2-AB83-44AE-A87C-C7EB7AA2953A"}, {"criteria": "cpe:2.3:o:novell:netware:6.5:sp1.1b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "062E2A9A-CF88-4844-B5A1-7418722087D9"}, {"criteria": "cpe:2.3:o:novell:netware:6.5:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F8E031C-CE1F-410F-8F32-B3E33719C498"}, {"criteria": "cpe:2.3:o:novell:netware:6.5:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87F80FDC-7851-4EA8-BC7D-87B85C6BB93C"}, {"criteria": "cpe:2.3:o:novell:netware:6.5:sp4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8C3AB68F-1D78-4217-9C56-B1B25F62FF38"}, {"criteria": "cpe:2.3:o:novell:netware:6.5:sp5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F7A41C8-4332-4F8C-A297-6850C05B3EB6"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org", "evaluatorSolution": "Apply fix for Novell NetWare 6.5 Support Pack 3, 4, or 5."}