Vulnerability Description
srvloc.sys in Novell Client for Windows before 4.91 SP3 allows remote attackers to cause an unspecified denial of service via a crafted packet to port 427 that triggers an access of pageable or invalid addresses using a higher interrupt request level (IRQL) than necessary.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Novell | Client | 4.91 |
References
- http://secunia.com/advisories/23244
- http://www.securityfocus.com/bid/21430PatchVendor Advisory
- http://www.vupen.com/english/advisories/2006/4840
- https://secure-support.novell.com/KanisaPlatform/Publishing/859/3480790_f.SAL_PuPatchVendor Advisory
- http://secunia.com/advisories/23244
- http://www.securityfocus.com/bid/21430PatchVendor Advisory
- http://www.vupen.com/english/advisories/2006/4840
- https://secure-support.novell.com/KanisaPlatform/Publishing/859/3480790_f.SAL_PuPatchVendor Advisory
FAQ
What is CVE-2006-6307?
CVE-2006-6307 is a vulnerability with a CVSS score of 5.0 (MEDIUM). srvloc.sys in Novell Client for Windows before 4.91 SP3 allows remote attackers to cause an unspecified denial of service via a crafted packet to port 427 that triggers an access of pageable or invali...
How severe is CVE-2006-6307?
CVE-2006-6307 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6307?
Check the references section above for vendor advisories and patch information. Affected products include: Novell Client.