Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2013.1852 Security Vulnerability - BSOD in Vba32 AntiRootKit 24 December 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Novell Client for Windows Publisher: Novell Operating System: Windows Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2013-3705 Original Bulletin: https://www.novell.com/support/kb/doc.php?id=7014276 - --------------------------BEGIN INCLUDED TEXT-------------------- Security Vulnerability - BSOD in Vba32 AntiRootKit This document (7014276) is provided subject to the disclaimer at the end of this document. Environment Novell Client 2 SP3 for Windows Situation This security vulnerability allows user-mode program to bugcheck the machine. This denial of service includes the potential for data loss, as a side-effect of bugchecking the machine while applications are running. Resolution Fixed in Novell Client 2 SP3 for Windows (IR5). Status Security Alert Additional Information Found by Dmitry Varshavsky, working with VBA32. CVE-2013-3705 Disclaimer This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUrjJmhLndAQH1ShLAQI1oQ/8DAAiLUB9vKUA1mm7iOLWm3q2XbjAbPXk A22Fwh/aVySWvAdbKcAyjRm6Cow7MB6QLFlHvESv0E0AwgbJLytixBAHv3uvWMGz qFedbIvTlWyPW8CKCXZmYIo1RlPvmVZ0QJDs4JnEx+is4w5IXS+yUFlS1xv92/2Y 2va60zFGHA8SsdJuH9N8Fwmp9np0j2w6+X/4jRATDSILFbj4nHZHQOdAseJDfGSe vyZwVI9EUzJ6fHDEPmsgBcp/wMg1lry1eu6cqB9vmB0j04a8ehQi8z0zmaXyT7PK 6qrG9DckfoFF8dChziUw4me6J6dhx1FBOlM7+yqJ2oHFOyHep/AYqeCBSyarAM1o cMMOOSJ77XUf5VfdKufp4xgOM4yONc/9r0K7/Yuk+YWnwSlPP/ZxWS0Ql7LaAGKw Q7m2h9HbOtavr6JVlHsu3W3KZ9KPDgrMvSGwGu/sI1SHP33K/950YS6pvsLnLOXS 6i2yKTHVma+esXj0ndV7+1FpSKSDXKh8LHmk0KOb1nY0A/208rgxzwab6tZpcWd1 sqFgI3SbIRF5dbJ9vuBvKjG9cTAfJyvXageeBRGXIZbDl10R3TcXVpyAo3QThfX3 j+3cjnJa8mggpyY42qiIyVkIkZOMDDkuHc+teTrGWGwht/Z1Pq3ub56NUxdxU1Uv 0AG+inHcMEo= =TSrQ -----END PGP SIGNATURE-----