Novell iPrint Client < 5.44 Multiple Vulnerabilities

This script is Copyright (C) 2010-2017 Tenable Network Security, Inc.


Synopsis :

The remote host contains an application that is affected by multiple
vulnerabilities.

Description :

Novell iPrint Client version older than 5.44 is installed on the
remote host. Such versions are reportedly affected by multiple remote
code execution vulnerabilities:

- A buffer overflow was discovered in how iPrint client
handles the 'call-back-url' parameter value for a
'op-client-interface-version' operation where the
'result-type' parameter is set to 'url'.

- An uninitialized pointer vulnerability in ienipp.ocx
was discovered and allows an attacker to exploit an
issue where the uninitialized pointer is called and
the process jumps to an address space controllable
by the attacker.

See also :

http://dvlabs.tippingpoint.com/advisory/TPTI-10-08
http://secunia.com/secunia_research/2010-104/
http://download.novell.com/Download?buildid=H-2-uHNc5-A~
http://www.novell.com/support/viewContent.do?externalId=7006679

Solution :

Upgrade to Novell iPrint Client 5.44 or later.

Note that there is no fix available for Novell iPrint Client 4.x
branch so users should consider upgrading to 5.44 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 48407 ()

Bugtraq ID: 42576

CVE ID: CVE-2010-1527
CVE-2010-3105

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now