1. Symantec-Broadcom-Horizontal/
  2. Security Response/
  3. Attack Signatures/
  4. HTTP Novell IPrints ActiveX BO

HTTP Novell IPrints ActiveX BO

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.


This signature detects attempt to exploit Novell iPrint Client Remote Buffer Overflow Vulnerability.

Additional Information

Novell iPrint Client is a client application for printing over the internet.

The application is prone to remote stack-based buffer-overflow vulnerabilities because it fails to perform adequate checks on user-supplied input. Specifically, the following issues were reported:

1. A buffer-overflow issue arises in 'ienipp.ocx' when the application handles a specially crafted 'target-frame' parameter.

2. A buffer-overflow issue arises when the application handles specially crafted time information.

Attackers may exploit these issues to execute arbitrary code. Failed attacks will cause denial-of-service conditions.

These issues affect Novell iPrint Client 5.30; other versions may also be affected.


Updates are available from vendor.
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube