Novell iPrint Client < 5.32 Multiple Overflows

high Nessus Plugin ID 43060

Synopsis

The remote host contains an application that is affected by multiple buffer overflow vulnerabilities.

Description

The remote host has Novell iPrint Client installed.

The installed version of Novell iPrint Client is affected by multiple buffer overflow vulnerabilities :

- A stack-based buffer overflow exists due to insufficient boundary checks on the 'target-frame' parameter.
(CVE-2009-1568)

- A stack-based buffer overflow exists due to insufficient validation of time information. (CVE-2009-1569)

Solution

Upgrade to Novell iPrint Client 5.32 or later.

Note: There is no fix available for Novell iPrint Client 4.x branch.
Users should consider upgrading to 5.32

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2009-40

https://secuniaresearch.flexerasoftware.com/secunia_research/2009-44

https://seclists.org/fulldisclosure/2009/Dec/174

https://seclists.org/fulldisclosure/2009/Dec/175

http://download.novell.com/Download?buildid=29T3EFRky18~

Plugin Details

Severity: High

ID: 43060

File Name: novell_iprint_532.nasl

Version: 1.13

Type: local

Agent: windows

Family: Windows

Published: 12/8/2009

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:novell:iprint

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/7/2009

Vulnerability Publication Date: 12/7/2009

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (Novell iPrint Client ActiveX Control Date/Time Buffer Overflow)

Reference Information

CVE: CVE-2009-1568, CVE-2009-1569

BID: 37242

CWE: 119

Secunia: 35004, 37169