-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT Security Bulletin
A vulnerability has been identified in Novell NetWare 6.5 post SP8
16 October 2009
AusCERT Security Bulletin Summary
Product: Novell Netware 6.5
Operating System: Netware
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Member content until: Sunday, November 15 2009
A vulnerability has been identified in Novell NetWare 6.5 post SP8.
The vendor has provided the following description of the
"This vulnerability allows PKERNEL.NLM's stack buffer to be exceeded,
potentially resulting in processor faults, abends, or execution of
arbitrary code (for example, due to corrupted code pointers in the
stack). Authentication is not required to exploit this vulnerability.
The specific flaw exists within the processing of CALLIT RPC calls.
The vulnerable daemon explicitly trusts a length field when receiving
data which is later copied into a stack buffer, potentially resulting
in a stack overflow. Successful exploitation of this vulnerability
could theoretically lead to remote code execution under the context of
The specific code containing the vulnerability is the implementation
of the CALLIT RPC call located in PKERNEL.NLM. The CALLIT RPC call is
responsible for forwarding requests to the actual service that it is
queried for." 
The vendor has provided a patch to correct this vulnerability which can
be downloaded from the vendor's website. 
 XNFS and PKERNEL post SP8 Updates
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: email@example.com
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----