1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Novell IPrint Client AX BO

HTTP Novell IPrint Client AX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempt to exploit a buffer overflow vulnerability by passing long arguments into a method of Novell iPrint Client 'ienipp.ocx' ActiveX Control.

Additional Information

Novell iPrint Client 'ienipp.ocx' ActiveX control is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.

Affected

  • The issue affects iPrint Client 4.26 and 4.32; other versions may also be vulnerable.

Response

The vendor has released patches to upgrade this issue. Please see the references for more information.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube