This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempt to exploit a buffer overflow vulnerability by passing long arguments into a method of Novell iPrint Client 'ienipp.ocx' ActiveX Control.
Novell iPrint Client 'ienipp.ocx' ActiveX control is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.
- The issue affects iPrint Client 4.26 and 4.32; other versions may also be vulnerable.
The vendor has released patches to upgrade this issue. Please see the references for more information.