-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1852
            Security Vulnerability - BSOD in Vba32 AntiRootKit
                             24 December 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Novell Client for Windows
Publisher:         Novell
Operating System:  Windows
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-3705  

Original Bulletin: 
   https://www.novell.com/support/kb/doc.php?id=7014276

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Vulnerability - BSOD in Vba32 AntiRootKit

This document (7014276) is provided subject to the disclaimer at the end of 
this document.

Environment
Novell Client 2 SP3 for Windows

Situation

This security vulnerability allows user-mode program to bugcheck the machine.  
This denial of service includes the potential for data loss, as a side-effect 
of bugchecking the machine while applications are running.

Resolution

Fixed in Novell Client 2 SP3 for Windows (IR5).

Status
Security Alert

Additional Information
Found by Dmitry Varshavsky, working with VBA32. CVE-2013-3705

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE 
customers and parties interested in our products and solutions to acquire 
information, ideas and learn from one another. Materials are provided for 
informational, personal or non-commercial use within your organization and
are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=TSrQ
-----END PGP SIGNATURE-----