1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. Web Attack: Novell iPrint Client CVE-2010-4321

Web Attack: Novell iPrint Client CVE-2010-4321

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detects attempts to exploit a buffer overflow vulnerability in Novell iPrint Client application.

Additional Information

Novell iPrint Client lets users access printers from remote locations.

Novell iPrint Client 'ienipp.ocx' ActiveX control is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. This issue affects the 'GetDriverSettings()' method of the 'ienipp.ocx' library.

An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage.

Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application (typically Internet Explorer) using the ActiveX control. Failed exploit attempts likely result in denial-of-service conditions.

iPrint Client 5.52 is affected; other versions may also be vulnerable.

Affected

  • iPrint Client 5.52 is affected; other versions may also be vulnerable.

Response

N/A
  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube