Vulnerability Report: Novell NetWare 6.x

This vulnerability report for Novell NetWare 6.x contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Novell NetWare 6.x then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2015
2.2. Statistics for 2014
2.3. Statistics for 2013
2.4. Statistics for 2012
2.5. Statistics for 2011
2.6. Statistics for 2010
2.7. Statistics for 2009
2.8. Statistics for 2008
2.9. Statistics for 2007
2.10. Statistics for 2006
2.11. Statistics for 2005
2.12. Statistics for 2004
2.13. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2015
3.2. List for 2014
3.3. List for 2013
3.4. List for 2012
3.5. List for 2011
3.6. List for 2010
3.7. List for 2009
3.8. List for 2008
3.9. List for 2007
3.10. List for 2006
3.11. List for 2005
3.12. List for 2004
3.13. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Novell

Product Link View Here (Link to external site)

Affected By 35 Secunia advisories
40 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 11% (4 of 35 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Novell NetWare 6.x, with all vendor patches applied, is rated Moderately critical .




35 Secunia Advisories in 2003-2015

Secunia has issued a total of 35 Secunia advisories in 2003-2015 for Novell NetWare 6.x. Currently, 11% (4 out of 35) are marked as unpatched with the most severe being rated Moderately critical

More information about the specific Secunia advisories affecting Novell NetWare 6.x can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



patched Novell NetWare XNFS.NLM "xdrDecodeString()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 1 of 4 in 2011. 2,209 views.
Release Date:
2011-11-24
Secunia Advisory ID:
SA46898
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


unpatched Novell Netware HTTP Server ByteRange Filter Denial of Service Vulnerability
Unpatched. Secunia Advisory 2 of 4 in 2011. 1,664 views.
Release Date:
2011-10-25
Secunia Advisory ID:
SA46572
Solution Status:
Unpatched
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Novell has acknowledged a vulnerability in Novell Netware, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Novell NetWare FTP Server "DELE" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 3 of 4 in 2011. 2,585 views.
Release Date:
2011-03-21
Secunia Advisory ID:
SA43824
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


patched Novell Netware XNFS.NLM "xdrDecodeString()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 4 of 4 in 2011. 2,903 views.
Release Date:
2011-02-24
Secunia Advisory ID:
SA43431
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Novell Netware, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


unpatched Novell NetWare OpenSSH Buffer Overflow Vulnerability
Unpatched. Secunia Advisory 1 of 4 in 2010. 3,695 views.
Release Date:
2010-08-31
Secunia Advisory ID:
SA41180
Solution Status:
Unpatched
Criticality:
Moderately critical
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


patched Novell NetWare SMB "AccountName" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 2 of 4 in 2010. 4,509 views.
Release Date:
2010-06-17
Secunia Advisory ID:
SA40199
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
Laurent Gaffié has reported a vulnerability in Novell NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


patched Novell NetWare FTP Server Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 3 of 4 in 2010. 3,472 views.
Release Date:
2010-03-30
Secunia Advisory ID:
SA39151
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Francis Provencher has reported a vulnerability in Novell NetWare, which can be exploited by malicious users to potentially compromise a vulnerable system. [Read More]


unpatched Novell NetWare AFP Implementation Denial of Service Vulnerability
Unpatched. Secunia Advisory 4 of 4 in 2010. 4,006 views.
Release Date:
2010-01-06
Secunia Advisory ID:
SA38114
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
Francis Provencher has reported a vulnerability in Novell NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Novell NetWare RPC CALLIT Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 1 of 2 in 2009. 4,557 views.
Release Date:
2009-10-01
Secunia Advisory ID:
SA36916
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Novell NetWare "named" Dynamic Update Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 2 of 2 in 2009. 2,181 views.
Release Date:
2009-08-12
Secunia Advisory ID:
SA36285
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Novell Netware Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 3 in 2008. 7,523 views.
Release Date:
2008-12-05
Secunia Advisory ID:
SA32989
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
Unknown
Security Bypass
Cross Site Scripting
Exposure of system information
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Novell Netware, where some have unspecified impacts and others can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, conduct cross-site scripting attacks, or compromise a user's system. [Read More]


patched Novell Netware DNS Cache Poisoning Vulnerability
Vendor Patch. Secunia Advisory 2 of 3 in 2008. 7,542 views.
Release Date:
2008-07-14
Secunia Advisory ID:
SA31065
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Spoofing
Where:
From remote
Short Description:
A vulnerability has been reported in Novell Netware, which can be exploited by malicious people to poison the DNS cache. [Read More]


patched Novell NetWare iPrint Request Denial of Service
Vendor Patch. Secunia Advisory 3 of 3 in 2008. 8,648 views.
Release Date:
2008-04-02
Secunia Advisory ID:
SA29587
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Novell NetWare XNFS Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 1 of 1 in 2007. 10,850 views.
Release Date:
2007-06-15
Secunia Advisory ID:
SA25697
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Novell NetWare Welcome web-app Cross-Site Scripting
Vendor Patch. Secunia Advisory 1 of 6 in 2006. 11,026 views.
Release Date:
2006-12-20
Secunia Advisory ID:
SA23406
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


patched Novell NetWare Apache HTTP Request Smuggling Vulnerability
Vendor Patch. Secunia Advisory 2 of 6 in 2006. 10,817 views.
Release Date:
2006-11-23
Secunia Advisory ID:
SA23074
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Novell has acknowledged a vulnerability in NetWare, which can be exploited by malicious people to conduct HTTP request smuggling attacks. [Read More]


patched Novell Netware abend.log User Credentials Disclosure
Vendor Patch. Secunia Advisory 3 of 6 in 2006. 11,910 views.
Release Date:
2006-05-26
Secunia Advisory ID:
SA20288
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A security issue has been reported in Novell Netware, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


patched Novell Distributed Print Services Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 4 of 6 in 2006. 14,940 views.
Release Date:
2006-05-10
Secunia Advisory ID:
SA20048
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
System access
Where:
From local network
Short Description:
Ryan Smith and Alex Wheeler have reported a vulnerability in Novell Distributed Print Service (DPS), which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


patched Novell NetWare NILE.NLM SSL Negotiation Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 6 in 2006. 12,589 views.
Release Date:
2006-03-22
Secunia Advisory ID:
SA19324
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Novell NetWare / Open Enterprise Server, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Novell NetWare NWFTPD Potential Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 6 of 6 in 2006. 11,865 views.
Release Date:
2006-03-17
Secunia Advisory ID:
SA19265
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in NetWare, which potentially can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


patched Novell NetWare CIFS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 4 in 2005. 12,662 views.
Release Date:
2005-08-31
Secunia Advisory ID:
SA16640
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Novell NetWare Unspecified TCP Packet Handling Denial of Service
Vendor Patch. Secunia Advisory 2 of 4 in 2005. 11,986 views.
Release Date:
2005-04-08
Secunia Advisory ID:
SA14874
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Novell NetWare, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Novell Netware Xsession Security Bypass
Vendor Patch. Secunia Advisory 3 of 4 in 2005. 12,545 views.
Release Date:
2005-03-17
Secunia Advisory ID:
SA14611
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
From local network
Short Description:
A vulnerability has been reported in Novell Netware, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


patched Novell Netware CIFS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 4 of 4 in 2005. 11,825 views.
Release Date:
2005-01-10
Secunia Advisory ID:
SA13766
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in NetWare 5.1 and 6.0, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Novell Netware "nlm" Screensaver Password Bypass Vulnerability
Vendor Patch. Secunia Advisory 1 of 4 in 2004. 12,756 views.
Release Date:
2004-12-14
Secunia Advisory ID:
SA13434
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Security Bypass
Where:
Local system
Short Description:
Novacoast has reported a vulnerability in Novell Netware, which can be exploited by a malicious person with physical access to a system to bypass the password protected screensaver. [Read More]


patched Novell Web Manager Unspecified Vulnerability
Vendor Patch. Secunia Advisory 2 of 4 in 2004. 9,047 views.
Release Date:
2004-08-23
Secunia Advisory ID:
SA12049
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Unknown
Where:
From local network
Short Description:
A vulnerability with an unknown impact has been reported in Novell Web Manager on Novell NetWare 6.5. [Read More]


patched Novell NetWare TCP Connection Reset Denial of Service
Vendor Patch. Secunia Advisory 3 of 4 in 2004. 10,857 views.
Release Date:
2004-05-21
Secunia Advisory ID:
SA11679
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
Novell has partly acknowledged a vulnerability in NetWare, which can be exploited by malicious people to reset established TCP connections on a vulnerable system. [Read More]


patched Novell NetWare Admin/Install Password Disclosure
Vendor Patch. Secunia Advisory 4 of 4 in 2004. 12,175 views.
Release Date:
2004-03-24
Secunia Advisory ID:
SA11188
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A security issue has been discovered in NetWare 6.5 Support Pack 1.1, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


patched Novell NFS Server Incorrect Hostname Alias Handling Vulnerability
Vendor Patch. Secunia Advisory 1 of 6 in 2003. 9,621 views.
Release Date:
2003-12-05
Secunia Advisory ID:
SA10373
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
Security Bypass
Where:
From local network
Short Description:
Novell has reported a vulnerability in NetWare 6.5, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


unpatched Novell Port Mapper Service Buffer Overflow Vulnerability
Unpatched. Secunia Advisory 2 of 6 in 2003. 12,267 views.
Release Date:
2003-10-30
Secunia Advisory ID:
SA10100
Solution Status:
Unpatched
Criticality:
Less critical
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Port Mapper service ("PMAP.NLM"), which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Novell update for OpenSSH
Vendor Patch. Secunia Advisory 3 of 6 in 2003. 8,073 views.
Release Date:
2003-10-14
Secunia Advisory ID:
SA9995
Solution Status:
Vendor Patch
Criticality:
Highly critical
Impact:
DoS
System access
Where:
From remote
Short Description:
Novell has issued an updated version of OpenSSH for Netware 6.5. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


patched Novell Netware Broker Information Disclosure Vulnerability
Vendor Patch. Secunia Advisory 4 of 6 in 2003. 8,637 views.
Release Date:
2003-10-02
Secunia Advisory ID:
SA9896
Solution Status:
Vendor Patch
Criticality:
Not critical
Impact:
Exposure of system information
Where:
From local network
Short Description:
A vulnerability has been reported in Novell Netware Broker, which can be exploited by malicious people to disclose various system information. [Read More]


patched Netware XNFS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 6 in 2003. 9,081 views.
Release Date:
2003-08-18
Secunia Advisory ID:
SA9547
Solution Status:
Vendor Patch
Criticality:
Less critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been identified in Netware 6.5, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Novell Netware HTTPSTK Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 6 of 6 in 2003. 9,611 views.
Release Date:
2003-06-09
Secunia Advisory ID:
SA8972
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Novell Netware 6, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


patched Novell updates to iManager
Vendor Patch. Secunia Advisory 1 of 1 in 2002. 6,971 views.
Release Date:
2002-11-12
Secunia Advisory ID:
SA7487
Solution Status:
Vendor Patch
Criticality:
Moderately critical
Impact:
DoS
Where:
From remote
Short Description:
Novell has issued an update to iManager which is part of Novell 6. The login name parameter is not properly verified, this allows a malicious person to cause a buffer overflow which crashes eMFrame. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Novell NetWare 6.x 
No posts yet

-

You must be logged in to post a comment.