Novell iPrint Client < 5.72 Code Execution Vulnerability

high Nessus Network Monitor Plugin ID 6054

Synopsis

The remote host contains an application that is vulnerable to multiple attack vectors.

Description

The remote host has the Novell iPrint client installed.

Versions of Novell iPrint Client earlier than 5.72 are potentially affected by a buffer overflow vulnerability in the GetDriverSettings method of the nipplib.dll component. A remote, unauthenticated attacker, exploiting this flaw, could execute arbitrary code on the remote host subject to the privileges of the user running the affected application.

Solution

Upgrade to Novell iPrint Client 5.72 or later.

See Also

http://www.zerodayinitiative.com/advisories/ZDI-11-309

http://download.novell.com/Download?buildid=bSpj4nhVEZ0~

Plugin Details

Severity: High

ID: 6054

Family: Web Clients

Published: 10/27/2011

Updated: 3/6/2019

Nessus ID: 56682

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:novell:iprint_open_enterprise_server_2

Patch Publication Date: 10/24/2011

Vulnerability Publication Date: 10/24/2011

Reference Information

CVE: CVE-2011-3173

BID: 50367