Novell iPrint Client < 5.72 Code Execution Vulnerability

High Nessus Network Monitor Plugin ID 6054

Synopsis

The remote host contains an application that is vulnerable to multiple attack vectors.

Description

The remote host has the Novell iPrint client installed.

Versions of Novell iPrint Client earlier than 5.72 are potentially affected by a buffer overflow vulnerability in the GetDriverSettings method of the nipplib.dll component. A remote, unauthenticated attacker, exploiting this flaw, could execute arbitrary code on the remote host subject to the privileges of the user running the affected application.

Solution

Upgrade to Novell iPrint Client 5.72 or later.

See Also

http://www.zerodayinitiative.com/advisories/ZDI-11-309

http://download.novell.com/Download?buildid=bSpj4nhVEZ0~

Plugin Details

Severity: High

ID: 6054

File Name: 6054.prm

Family: Web Clients

Published: 2011/10/27

Modified: 2016/01/19

Dependencies: 4543

Nessus ID: 56682

Risk Information

Risk Factor: High

CVSSv2

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 2011/10/24

Vulnerability Publication Date: 2011/10/24

Reference Information

CVE: CVE-2011-3173

BID: 50367

OSVDB: 76631