This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects an attempt to exploit a buffer overflow vulnerability in iPrint Client ActiveX control.
Novell iPrint Client lets users access printers from remote locations.
Novell iPrint Client 'ienipp.ocx' ActiveX control is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.
This issue affects the 'ExecuteRequest()' method of the 'ienipp.ocx' library. The ActiveX control is identified by CLSID: 36723F97-7AA0-11D4-8919-FF2D71D0D32C.
An attacker can exploit this issue by enticing an unsuspecting user to view a malicious HTML page.
Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions.
- iPrint Client 4.26 and 4.32