Skip to main content

Novell iPrint Client "GetDriverSettings()" Remote Stack Overflow Vulnerability

Last Update Date: 28 Jan 2011 Release Date: 22 Nov 2010 4703 Views

RISK: Medium Risk

A vulnerability has been identified Novell iPrint Client, which could be exploited by remote attackers to execute arbitrary code. This issue is caused by a buffer overflow error in the "ienipp.ocx" ActiveX component when processing data supplied via the "GetDriverSettings()" method, which could be exploited by remote attackers to compromise a vulnerable system by convincing a user to visit a malicious web page.


Impact

  • Remote Code Execution

System / Technologies affected

  • Novell iPrint Client for Windows version 5.52 and prior

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Set the kill-bit for the affected ActiveX control.


Vulnerability Identifier

  • No CVE information is available

Source


Related Link