Novell iPrint Client < 5.32 Multiple Overflows

This script is Copyright (C) 2009-2017 Tenable Network Security, Inc.


Synopsis :

The remote host contains an application that is affected by multiple
buffer overflow vulnerabilities.

Description :

The remote host has Novell iPrint Client installed.

The installed version of Novell iPrint Client is affected by multiple
buffer overflow vulnerabilities :

- A stack-based buffer overflow exists due to insufficient
boundary checks on the 'target-frame' parameter.
(CVE-2009-1568)

- A stack-based buffer overflow exists due to insufficient
validation of time information. (CVE-2009-1569)

See also :

http://secunia.com/secunia_research/2009-40
http://secunia.com/secunia_research/2009-44
http://seclists.org/fulldisclosure/2009/Dec/174
http://seclists.org/fulldisclosure/2009/Dec/175
http://download.novell.com/Download?buildid=29T3EFRky18~

Solution :

Upgrade to Novell iPrint Client 5.32 or later.

Note: There is no fix available for Novell iPrint Client 4.x branch.
Users should consider upgrading to 5.32

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 43060 ()

Bugtraq ID: 37242

CVE ID: CVE-2009-1568
CVE-2009-1569

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now