A vulnerability has been reported in Novell Client, which can be exploited by malicious, local users to gain escalated privileges.
Insufficient address space verification within the IOCTL handlers of the NWFILTER.SYS device driver and insecure permissions on the "\.\nwfilter" device can be exploited e.g. to access certain IOCTL handlers and overwrite arbitrary memory, and execute code with kernel privileges.
The vulnerability affects version 4.91 Support Pack 1 to Support Pack 4 and is reported in nwfilter.sys in file version 126.96.36.199.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com