This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects attempts to exploit a buffer overflow vulnerability in Novell iPrint Client application.
Novell iPrint Client lets users access printers from remote locations.
Novell iPrint Client 'ienipp.ocx' ActiveX control is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. This issue affects the 'GetDriverSettings()' method of the 'ienipp.ocx' library.
An attacker can exploit this issue by enticing an unsuspecting user to view a malicious webpage.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application (typically Internet Explorer) using the ActiveX control. Failed exploit attempts likely result in denial-of-service conditions.
iPrint Client 5.52 is affected; other versions may also be vulnerable.
- iPrint Client 5.52 is affected; other versions may also be vulnerable.