Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Novell NetWare 6.x

This vulnerability report for Novell NetWare 6.x contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Novell NetWare 6.x then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Novell

Product Link View Here (Link to external site)

Affected By 35 Secunia advisories
40 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 11% (4 of 35 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Novell NetWare 6.x, with all vendor patches applied, is rated Moderately critical .




35 Secunia Advisories in 2003-2014

Secunia has issued a total of 35 Secunia advisories in 2003-2014 for Novell NetWare 6.x. Currently, 11% (4 out of 35) are marked as unpatched with the most severe being rated Moderately critical

More information about the specific Secunia advisories affecting Novell NetWare 6.x can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Novell NetWare XNFS.NLM "xdrDecodeString()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 1 of 4 in 2011. 2,048 views.
Release Date:
2011-11-24
Secunia Advisory ID:
SA46898
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Novell Netware HTTP Server ByteRange Filter Denial of Service Vulnerability
Unpatched. Secunia Advisory 2 of 4 in 2011. 1,517 views.
Release Date:
2011-10-25
Secunia Advisory ID:
SA46572
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Novell has acknowledged a vulnerability in Novell Netware, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Novell NetWare FTP Server "DELE" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 3 of 4 in 2011. 2,346 views.
Release Date:
2011-03-21
Secunia Advisory ID:
SA43824
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Novell Netware XNFS.NLM "xdrDecodeString()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 4 of 4 in 2011. 2,660 views.
Release Date:
2011-02-24
Secunia Advisory ID:
SA43431
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Novell Netware, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Novell NetWare OpenSSH Buffer Overflow Vulnerability
Unpatched. Secunia Advisory 1 of 4 in 2010. 3,348 views.
Release Date:
2010-08-31
Secunia Advisory ID:
SA41180
Solution Status:
Unpatched
Criticality:
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious users to compromise a vulnerable system. [Read More]


Novell NetWare SMB "AccountName" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 2 of 4 in 2010. 4,238 views.
Release Date:
2010-06-17
Secunia Advisory ID:
SA40199
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Laurent Gaffié has reported a vulnerability in Novell NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Novell NetWare FTP Server Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 3 of 4 in 2010. 3,213 views.
Release Date:
2010-03-30
Secunia Advisory ID:
SA39151
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Francis Provencher has reported a vulnerability in Novell NetWare, which can be exploited by malicious users to potentially compromise a vulnerable system. [Read More]


Novell NetWare AFP Implementation Denial of Service Vulnerability
Unpatched. Secunia Advisory 4 of 4 in 2010. 3,799 views.
Release Date:
2010-01-06
Secunia Advisory ID:
SA38114
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Francis Provencher has reported a vulnerability in Novell NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Novell NetWare RPC CALLIT Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 1 of 2 in 2009. 4,382 views.
Release Date:
2009-10-01
Secunia Advisory ID:
SA36916
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious people to compromise a vulnerable system. [Read More]


Novell NetWare "named" Dynamic Update Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 2 of 2 in 2009. 2,062 views.
Release Date:
2009-08-12
Secunia Advisory ID:
SA36285
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Novell Netware Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 3 in 2008. 7,147 views.
Release Date:
2008-12-05
Secunia Advisory ID:
SA32989
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Security Bypass
Cross Site Scripting
Exposure of system information
Exposure of sensitive information
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Novell Netware, where some have unspecified impacts and others can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, conduct cross-site scripting attacks, or compromise a user's system. [Read More]


Novell Netware DNS Cache Poisoning Vulnerability
Vendor Patch. Secunia Advisory 2 of 3 in 2008. 7,300 views.
Release Date:
2008-07-14
Secunia Advisory ID:
SA31065
Solution Status:
Vendor Patch
Criticality:
Impact:
Spoofing
Where:
From remote
Short Description:
A vulnerability has been reported in Novell Netware, which can be exploited by malicious people to poison the DNS cache. [Read More]


Novell NetWare iPrint Request Denial of Service
Vendor Patch. Secunia Advisory 3 of 3 in 2008. 8,425 views.
Release Date:
2008-04-02
Secunia Advisory ID:
SA29587
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Novell NetWare XNFS Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 1 of 1 in 2007. 10,694 views.
Release Date:
2007-06-15
Secunia Advisory ID:
SA25697
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Novell NetWare Welcome web-app Cross-Site Scripting
Vendor Patch. Secunia Advisory 1 of 6 in 2006. 10,778 views.
Release Date:
2006-12-20
Secunia Advisory ID:
SA23406
Solution Status:
Vendor Patch
Criticality:
Impact:
Cross Site Scripting
Where:
From remote
Short Description:
A vulnerability has been reported in Novell NetWare, which can be exploited by malicious people to conduct cross-site scripting attacks. [Read More]


Novell NetWare Apache HTTP Request Smuggling Vulnerability
Vendor Patch. Secunia Advisory 2 of 6 in 2006. 10,567 views.
Release Date:
2006-11-23
Secunia Advisory ID:
SA23074
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Cross Site Scripting
Manipulation of data
Where:
From remote
Short Description:
Novell has acknowledged a vulnerability in NetWare, which can be exploited by malicious people to conduct HTTP request smuggling attacks. [Read More]


Novell Netware abend.log User Credentials Disclosure
Vendor Patch. Secunia Advisory 3 of 6 in 2006. 11,727 views.
Release Date:
2006-05-26
Secunia Advisory ID:
SA20288
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A security issue has been reported in Novell Netware, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Novell Distributed Print Services Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 4 of 6 in 2006. 14,703 views.
Release Date:
2006-05-10
Secunia Advisory ID:
SA20048
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From local network
Short Description:
Ryan Smith and Alex Wheeler have reported a vulnerability in Novell Distributed Print Service (DPS), which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Novell NetWare NILE.NLM SSL Negotiation Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 6 in 2006. 12,329 views.
Release Date:
2006-03-22
Secunia Advisory ID:
SA19324
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Novell NetWare / Open Enterprise Server, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Novell NetWare NWFTPD Potential Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 6 of 6 in 2006. 11,664 views.
Release Date:
2006-03-17
Secunia Advisory ID:
SA19265
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in NetWare, which potentially can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Novell NetWare CIFS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 1 of 4 in 2005. 12,477 views.
Release Date:
2005-08-31
Secunia Advisory ID:
SA16640
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in NetWare, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Novell NetWare Unspecified TCP Packet Handling Denial of Service
Vendor Patch. Secunia Advisory 2 of 4 in 2005. 11,824 views.
Release Date:
2005-04-08
Secunia Advisory ID:
SA14874
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Novell NetWare, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Novell Netware Xsession Security Bypass
Vendor Patch. Secunia Advisory 3 of 4 in 2005. 12,357 views.
Release Date:
2005-03-17
Secunia Advisory ID:
SA14611
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
A vulnerability has been reported in Novell Netware, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Novell Netware CIFS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 4 of 4 in 2005. 11,707 views.
Release Date:
2005-01-10
Secunia Advisory ID:
SA13766
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in NetWare 5.1 and 6.0, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Novell Netware "nlm" Screensaver Password Bypass Vulnerability
Vendor Patch. Secunia Advisory 1 of 4 in 2004. 12,563 views.
Release Date:
2004-12-14
Secunia Advisory ID:
SA13434
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Novacoast has reported a vulnerability in Novell Netware, which can be exploited by a malicious person with physical access to a system to bypass the password protected screensaver. [Read More]


Novell Web Manager Unspecified Vulnerability
Vendor Patch. Secunia Advisory 2 of 4 in 2004. 8,847 views.
Release Date:
2004-08-23
Secunia Advisory ID:
SA12049
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
From local network
Short Description:
A vulnerability with an unknown impact has been reported in Novell Web Manager on Novell NetWare 6.5. [Read More]


Novell NetWare TCP Connection Reset Denial of Service
Vendor Patch. Secunia Advisory 3 of 4 in 2004. 10,756 views.
Release Date:
2004-05-21
Secunia Advisory ID:
SA11679
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Novell has partly acknowledged a vulnerability in NetWare, which can be exploited by malicious people to reset established TCP connections on a vulnerable system. [Read More]


Novell NetWare Admin/Install Password Disclosure
Vendor Patch. Secunia Advisory 4 of 4 in 2004. 12,000 views.
Release Date:
2004-03-24
Secunia Advisory ID:
SA11188
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A security issue has been discovered in NetWare 6.5 Support Pack 1.1, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Novell NFS Server Incorrect Hostname Alias Handling Vulnerability
Vendor Patch. Secunia Advisory 1 of 6 in 2003. 9,558 views.
Release Date:
2003-12-05
Secunia Advisory ID:
SA10373
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
Novell has reported a vulnerability in NetWare 6.5, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Novell Port Mapper Service Buffer Overflow Vulnerability
Unpatched. Secunia Advisory 2 of 6 in 2003. 11,887 views.
Release Date:
2003-10-30
Secunia Advisory ID:
SA10100
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Port Mapper service ("PMAP.NLM"), which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Novell update for OpenSSH
Vendor Patch. Secunia Advisory 3 of 6 in 2003. 7,964 views.
Release Date:
2003-10-14
Secunia Advisory ID:
SA9995
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
Novell has issued an updated version of OpenSSH for Netware 6.5. This fixes some vulnerabilities, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. [Read More]


Novell Netware Broker Information Disclosure Vulnerability
Vendor Patch. Secunia Advisory 4 of 6 in 2003. 8,552 views.
Release Date:
2003-10-02
Secunia Advisory ID:
SA9896
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
From local network
Short Description:
A vulnerability has been reported in Novell Netware Broker, which can be exploited by malicious people to disclose various system information. [Read More]


Netware XNFS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 6 in 2003. 8,993 views.
Release Date:
2003-08-18
Secunia Advisory ID:
SA9547
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been identified in Netware 6.5, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Novell Netware HTTPSTK Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 6 of 6 in 2003. 9,500 views.
Release Date:
2003-06-09
Secunia Advisory ID:
SA8972
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Novell Netware 6, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Novell updates to iManager
Vendor Patch. Secunia Advisory 1 of 1 in 2002. 6,908 views.
Release Date:
2002-11-12
Secunia Advisory ID:
SA7487
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Novell has issued an update to iManager which is part of Novell 6. The login name parameter is not properly verified, this allows a malicious person to cause a buffer overflow which crashes eMFrame. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Novell NetWare 6.x 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer