Novell iPrint Client < 5.32 Multiple Overflows

High Nessus Plugin ID 43060


The remote host contains an application that is affected by multiple buffer overflow vulnerabilities.


The remote host has Novell iPrint Client installed.

The installed version of Novell iPrint Client is affected by multiple buffer overflow vulnerabilities :

- A stack-based buffer overflow exists due to insufficient boundary checks on the 'target-frame' parameter.

- A stack-based buffer overflow exists due to insufficient validation of time information. (CVE-2009-1569)


Upgrade to Novell iPrint Client 5.32 or later.

Note: There is no fix available for Novell iPrint Client 4.x branch.
Users should consider upgrading to 5.32

See Also

Plugin Details

Severity: High

ID: 43060

File Name: novell_iprint_532.nasl

Version: $Revision: 1.11 $

Type: local

Agent: windows

Family: Windows

Published: 2009/12/08

Modified: 2017/08/15

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:novell:iprint

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/12/07

Vulnerability Publication Date: 2009/12/07

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (Novell iPrint Client ActiveX Control Date/Time Buffer Overflow)

Reference Information

CVE: CVE-2009-1568, CVE-2009-1569

BID: 37242

OSVDB: 60803, 60804

Secunia: 35004, 37169

CWE: 119