search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Novell NetWare NFS denial of service vulnerability

Vulnerability Note VU#578105

Original Release Date: 2007-06-27 | Last Revised: 2007-06-27


The Novell NetWare NFS mount daemon contains a denial of service vulnerability.


Network File System (NFS) is an ONC RPC based file and print sharing protocol. Novell Netware includes support for the NFS protocol.

From Novell Support Document 3008097:

If an NFS client attempts a mount command against a NetWare 6.5 NFS server, and the path component of the command exceeds 508 characters, the XNFS.NLM on the NetWare server will abend, in an rpcWorkerThread. This can happen anytime XNFS.NLM is loaded, even if there is not any path currently exported.

This makes the NetWare server vulnerable to denial-of-service attack, anytime XNFS.NLM is loaded.

This vulnerability is not necessarily limited to NetWare 6.5 SP6. Older support packs are likely vulnerable as well.


A remote, unauthenticated attacker may be able to create a denial of service condition.



Novell has released an update to address this issue. See Novell support document 5004900 for details about patch availability.

Restrict access
Restriciting network access to NFS servers and clients may mitigate this vulnerability.

Vendor Information


Novell, Inc. Affected

Updated:  June 27, 2007



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


See for more details.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector



Thanks to Novell for information that was used in this report.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2007-3207
Severity Metric: 3.28
Date Public: 2007-06-15
Date First Published: 2007-06-27
Date Last Updated: 2007-06-27 13:21 UTC
Document Revision: 3

Sponsored by CISA.