Novell iPrint Client Multiple Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Novell iPrint Client, which could be exploited by remote attackers to manipulate certain data or compromise a vulnerable system.
1. An unspecified error exists in the browser plugin when parsing parameter names.
2. A boundary error in the ActiveX control (ienipp.ocx) when constructing a debug string based on input supplied to the "ExecuteRequest()" method can be exploited to cause a stack-based buffer overflow via an overly long string.
3. An unspecified error in the browser plugin can be exploited to delete files on a user's system.
Successful exploitation of vulnerabilities 1 and 2 may allow execution of arbitrary code.
Impact
- Remote Code Execution
System / Technologies affected
- iPrint Client for Windows XP/Vista/Win7 5.40 (other versions may also be affected)
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 5.42:
http://download.novell.com/Download?buildid=ftwZBxEFjIg~
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with