Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Novell iPrint Client < 5.42 Multiple Vulnerabilities

Medium

Synopsis

The remote host contains an application that is vulnerable to multiple attack vectors.

Description

Versions of Novell iPrint Client earlier than 5.42 are potentially affected by multiple vulnerabilities :

- Due to a flaw in the nipplib.dll module, it may be possible for a remote attacker to delete arbitrary files from the remote system via the 'CleanUploadFiles' method provided by an ActiveX control. (TPTI-10-05)

- By passing a specially crafted value to the 'debug' parameter in the ActiveX control ienipp.ocx, it may be possible for an attacker to trigger a stack-based buffer overflow, potentially resulting in arbitrary code execution within the context of the user running the browser. (TPTI-10-06)

- Due to improper validation of plugin parameters, it may be possible for an attacker to trigger a buffer overflow condition resulting in arbitrary code execution within the context of the user running the browser. (ZDI-10-139)

Due to improper validation of plugin parameters it may be possible for an attacker to trigger a stack-based buffer overflow, potentially resulting in arbitrary code execution within the context of the user running the browser. (ZDI-10-140)

Solution

Upgrade to Novell iPrint Client 5.42 or later.