CVE-2010-3106 – Novell iPrint Client - ActiveX Control 'debug' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2010-3106
The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method. El control ActiveX ienipp.ocx en el plugin para el navegador en el cliente de Novell iPrint antes de v5.42 no valida correctamente el parámetro debug, lo que permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (por corrupción de memoria de pila) a través de un parámetro value con una longitud modificada a mano. Se trata de una vulnerabilidad relacionada con el método ExecuteRequest. • https://www.exploit-db.com/exploits/15073 https://www.exploit-db.com/exploits/16492 http://download.novell.com/Download?buildid=ftwZBxEFjIg~ http://dvlabs.tippingpoint.com/advisory/TPTI-10-06 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12044 • CWE-20: Improper Input Validation •
CVE-2010-1527 – Novell iPrint Client Browser Plugin - 'call-back-url' Remote Stack Overflow
https://notcve.org/view.php?id=CVE-2010-1527
Stack-based buffer overflow in Novell iPrint Client before 5.44 allows remote attackers to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version action. Un desbordamiento de búfer basado en pila en iPrint de Novell Client antes de v5.44 permite a atacantes remotos ejecutar código arbitrario mediante un parámetro call-back-url demasiado largo en una acción op-client-interface-version. • https://www.exploit-db.com/exploits/15042 https://www.exploit-db.com/exploits/15072 http://secunia.com/advisories/40805 http://secunia.com/secunia_research/2010-104 http://www.novell.com/support/viewContent.do?externalId=7006679 http://www.securityfocus.com/bid/42576 https://exchange.xforce.ibmcloud.com/vulnerabilities/61220 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11973 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2010-4314 – Novell iPrint Client Browser Plugin Parameter Name Remote Code Execution
https://notcve.org/view.php?id=CVE-2010-4314
Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the "name" parameter. Atacantes remotos puede utilizar el plugin ActiveX del navegador web de iPrint en Novell iPrint Client en versiones anteriores a 5.42 para Windows XP/Vista/Win7 para ejecutar código desbordando el parámetro "name". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Novell iPrint Client browser plugin. User interaction is required in that a target must visit a malicious web page. The specific flaw exists within handling plugin parameters. The application does not properly verify the name of parameters passed via <embed> tags. • https://www.novell.com/support/kb/doc.php?id=7006675 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2009-1569 – Novell iPrint Client - ActiveX Control Date/Time Buffer Overflow
https://notcve.org/view.php?id=CVE-2009-1569
Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions before 5.32 allow remote attackers to execute arbitrary code via vectors related to (1) Date and (2) Time. Múltiples desbordamientos de búfer basados en pila en Novell iPrint Client v4.38, v5.30, y probablemente otras versiones anteriores a v5.32 permite a atacantes remotos ejecutar código de su elección a través de vectores relacionados con (1) Date y (2) Time. • https://www.exploit-db.com/exploits/16543 http://download.novell.com/Download?buildid=29T3EFRky18~ http://secunia.com/advisories/35004 http://secunia.com/advisories/37169 http://secunia.com/secunia_research/2009-44 http://www.securityfocus.com/archive/1/508288/100/0/threaded http://www.securityfocus.com/bid/37242 http://www.vupen.com/english/advisories/2009/3429 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2009-1568 – Novell iPrint Client - ActiveX Control target-frame Buffer Overflow
https://notcve.org/view.php?id=CVE-2009-1568
Stack-based buffer overflow in ienipp.ocx in Novell iPrint Client 5.30, and possibly other versions before 5.32, allows remote attackers to execute arbitrary code via a long target-frame parameter. esbordamiento de búfer basado en pila en ienipp.ocx en Novell iPrint Client v5.30, y probablemente otras versiones anteriores a v5.32, permite a atacantes remotos ejecutar código de su elección a través de un parámetro largo target-frame. • https://www.exploit-db.com/exploits/16523 http://download.novell.com/Download?buildid=29T3EFRky18~ http://secunia.com/advisories/37169 http://secunia.com/secunia_research/2009-40 http://www.securityfocus.com/archive/1/508289/100/0/threaded http://www.securityfocus.com/bid/37242 http://www.vupen.com/english/advisories/2009/3429 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •