{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Novell Netware client 4.91 SP2.","product":{"name":"N/A","vendor":{"name":"Novell","scada":false}}},{"description":"Novell Netware client 4.91 SP1 ;","product":{"name":"N/A","vendor":{"name":"Novell","scada":false}}},{"description":"Novell Netware cleint 4.91 ;","product":{"name":"N/A","vendor":{"name":"Novell","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nCette vuln\u00e9rabilit\u00e9 provient d'une faille dans la librairie nwspool.dll\nqui ne g\u00e8re pas correctement certains arguments (d\u00e9passant 458 bits ou\n524 bits) pour les fonctions EnumPrinters() et OpenPrinter().\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2006-5854","url":"https://www.cve.org/CVERecord?id=CVE-2006-5854"}],"links":[{"title":"R\u00e9f\u00e9rence CVE :","url":"http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5854"}],"reference":"CERTA-2006-AVI-520","revisions":[{"description":"version initiale.","revision_date":"2006-12-01T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire"}],"summary":"Une vuln\u00e9rabilit\u00e9 d\u00e9couverte dans Novell netware client permet \u00e0 un\nutilisateur mal intentionn\u00e9 et sans authentification pr\u00e9alable\nd'\u00e9x\u00e9cuter du code arbitraire \u00e0 distance.\n","title":"Vuln\u00e9rabilit\u00e9 Novell","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 de Novell","url":"http://www.novell.com/support/search.do?cmd=displayKC&esternalld=312553&sliceld=SAL_Public"}]}
