Novell iPrint Client < 5.72 Code Execution Vulnerability

High Nessus Network Monitor Plugin ID 6054


The remote host contains an application that is vulnerable to multiple attack vectors.


The remote host has the Novell iPrint client installed.

Versions of Novell iPrint Client earlier than 5.72 are potentially affected by a buffer overflow vulnerability in the GetDriverSettings method of the nipplib.dll component. A remote, unauthenticated attacker, exploiting this flaw, could execute arbitrary code on the remote host subject to the privileges of the user running the affected application.


Upgrade to Novell iPrint Client 5.72 or later.

See Also

Plugin Details

Severity: High

ID: 6054

File Name: 6054.prm

Family: Web Clients

Published: 2011/10/27

Modified: 2016/01/19

Dependencies: 4543

Nessus ID: 56682

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 8.1

Temporal Score: 7.1


Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 2011/10/24

Vulnerability Publication Date: 2011/10/24

Reference Information

CVE: CVE-2011-3173

BID: 50367

OSVDB: 76631