Novell iPrint Client nipplib.dll IppCreateServerRef Function Buffer Overflow

medium Nessus Network Monitor Plugin ID 4647

Synopsis

The remote Windows host has an application that is affected by a buffer overflow vulnerability.

Description

The installed version of Novell iPrint Client is affected by a buffer overflow vulnerability. By passing very long arguments to either 'GetPrinterURLList()', 'GetPrinterURLList2()', or 'GetFileList2()' functions available in ActiveX control 'ienipp.ocx', it may be possible to cause a heap-based buffer overflow in function 'IppCreateServerRef()' provided by 'nipplib.dll'. Successful exploitation of this issue may result in arbitrary code execution on the remote system.

Solution

Upgrade to Novell iPrint Client version 5.08 or Novell iPrint Client for Windows 4.38 or higher.

See Also

http://download.novell.com/Download?buildid=3q-_lVDVRFI~

http://download.novell.com/Download?buildid=dv_yn4TOPmQ~

http://secunia.com/secunia_research/2008-33/advisory

Plugin Details

Severity: Medium

ID: 4647

Family: Web Clients

Published: 9/8/2008

Updated: 3/6/2019

Nessus ID: 34085

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:novell:iprint_client

Reference Information

CVE: CVE-2008-2436

BID: 30986