Novell iPrint Client "GetDriverSettings()" Remote Stack Overflow Vulnerability
Last Update Date:
28 Jan 2011
Release Date:
22 Nov 2010
5667
Views
RISK: Medium Risk
A vulnerability has been identified Novell iPrint Client, which could be exploited by remote attackers to execute arbitrary code. This issue is caused by a buffer overflow error in the "ienipp.ocx" ActiveX component when processing data supplied via the "GetDriverSettings()" method, which could be exploited by remote attackers to compromise a vulnerable system by convincing a user to visit a malicious web page.
Impact
- Remote Code Execution
System / Technologies affected
- Novell iPrint Client for Windows version 5.52 and prior
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Set the kill-bit for the affected ActiveX control.
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with