-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2009.1108
    A vulnerability has been identified in Novell NetWare 6.5 post SP8
                              16 October 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Novell Netware 6.5
Operating System:     Netware
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
Member content until: Sunday, November 15 2009

OVERVIEW

        A vulnerability has been identified in Novell NetWare 6.5 post SP8.


IMPACT

        The vendor has provided the following description of the 
        vulnerability:
        
        "This vulnerability allows PKERNEL.NLM's stack buffer to be exceeded, 
        potentially resulting in processor faults, abends, or execution of 
        arbitrary code (for example, due to corrupted code pointers in the 
        stack). Authentication is not required to exploit this vulnerability.
        
        The specific flaw exists within the processing of CALLIT RPC calls. 
        The vulnerable daemon explicitly trusts a length field when receiving 
        data which is later copied into a stack buffer, potentially resulting 
        in a stack overflow. Successful exploitation of this vulnerability 
        could theoretically lead to remote code execution under the context of 
        the daemon.
        
        The specific code containing the vulnerability is the implementation 
        of the CALLIT RPC call located in PKERNEL.NLM. The CALLIT RPC call is 
        responsible for forwarding requests to the actual service that it is 
        queried for." [1]


MITIGATION

        The vendor has provided a patch to correct this vulnerability which can
        be downloaded from the vendor's website. [1]


REFERENCES

        [1] XNFS and PKERNEL post SP8 Updates
            http://download.novell.com/Download?buildid=5sM2oFRBZaE~

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFK1+0/NVH5XJJInbgRAl9WAJ9UnZXm3tbPk2296slm48ZuVD82kwCbBk9r
a4mstoTUheU6YbtH5oJwxLs=
=eqCV
-----END PGP SIGNATURE-----