5 results (0.008 seconds)

CVSS: 9.3EPSS: 35%CPEs: 1EXPL: 3

Stack-based buffer overflow in an ActiveX control in ienipp.ocx in Novell iPrint Client 5.52 allows remote attackers to execute arbitrary code via a long argument to (1) the GetDriverSettings2 method, as reachable by (2) the GetDriverSettings method. El desbordamiento de búfer en la región stack de la memoria en un control ActiveX en el archivo ienipp.ocx en Novell iPrint Client versión 5.52, permite a los atacantes remotos ejecutar código arbitrario por medio de un argumento largo en (1) el método GetDriverSettings2, según sea accesible por (2 ) el método GetDriverSettings. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw exists within the ienipp.ocx component. When handling the exposed method a GetDriverSettings call is made into nipplib! • https://www.exploit-db.com/exploits/16014 https://www.exploit-db.com/exploits/16956 http://securityreason.com/securityalert/8125 http://www.exploit-db.com/exploits/16014 http://www.novell.com/support/viewContent.do?externalId=7007234 http://www.securityfocus.com/bid/44966 http://www.zerodayinitiative.com/advisories/ZDI-10-256 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 91%CPEs: 2EXPL: 1

Stack-based buffer overflow in ienipp.ocx in Novell iPrint Client 5.30, and possibly other versions before 5.32, allows remote attackers to execute arbitrary code via a long target-frame parameter. esbordamiento de búfer basado en pila en ienipp.ocx en Novell iPrint Client v5.30, y probablemente otras versiones anteriores a v5.32, permite a atacantes remotos ejecutar código de su elección a través de un parámetro largo target-frame. • https://www.exploit-db.com/exploits/16523 http://download.novell.com/Download?buildid=29T3EFRky18~ http://secunia.com/advisories/37169 http://secunia.com/secunia_research/2009-40 http://www.securityfocus.com/archive/1/508289/100/0/threaded http://www.securityfocus.com/bid/37242 http://www.vupen.com/english/advisories/2009/3429 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 28%CPEs: 5EXPL: 0

Multiple heap-based buffer overflows in the IppCreateServerRef function in nipplib.dll in Novell iPrint Client 4.x before 4.38 and 5.x before 5.08 allow remote attackers to execute arbitrary code via a long argument to the (1) GetPrinterURLList, (2) GetPrinterURLList2, or (3) GetFileList2 function in the Novell iPrint ActiveX control in ienipp.ocx. Múltiples desbordamientos de búfer basados en pila en la función nipplib.dll de Novell iPrint Client 4.x anteriores a la 4.38 y 5.x anteriores a la 5.08, permite a atacantes remotos ejecutar código arbitrariamente a través de un argumento largo a las funciones (1) GetPrinterURLList, (2) GetPrinterURLList2, o (3) GetFileList2 en el control ActiveX iPrint de Novell en ienipp.ocx. • http://secunia.com/advisories/31370 http://secunia.com/secunia_research/2008-33/advisory http://securityreason.com/securityalert/4228 http://www.securityfocus.com/archive/1/495940/100/0/threaded http://www.securityfocus.com/bid/30986 http://www.securitytracker.com/id?1020806 http://www.vupen.com/english/advisories/2008/2481 https://exchange.xforce.ibmcloud.com/vulnerabilities/44853 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.3EPSS: 47%CPEs: 1EXPL: 1

Multiple stack-based buffer overflows in a certain ActiveX control in ienipp.ocx in Novell iPrint Client for Windows before 4.36 allow remote attackers to execute arbitrary code via a long value of the (1) operation, (2) printer-url, or (3) target-frame parameter. NOTE: some of these details are obtained from third party information. Múltiples desbordamientos de búfer basados en pila en un determinado control ActiveX de ienipp.ocx en Novell iPrint Client para Windows versiones anteriores a 4.36 permiten a atacantes remotos ejecutar código de su elección a través un valor largo de los parámetros (1) operation, (2) printer-url, o (3) target-frame. NOTA: algunos de estos detalles han sido obtenidos a partir de la información de terceros. • https://www.exploit-db.com/exploits/16508 http://secunia.com/advisories/30709 http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5028061.html http://www.kb.cert.org/vuls/id/145313 http://www.securityfocus.com/bid/29736 http://www.securitytracker.com/id?1020303 http://www.vupen.com/english/advisories/2008/1837/references https://exchange.xforce.ibmcloud.com/vulnerabilities/43085 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 43%CPEs: 3EXPL: 1

Stack-based buffer overflow in the Novell iPrint Control ActiveX control in ienipp.ocx in Novell iPrint Client before 4.34 allows remote attackers to execute arbitrary code via a long argument to the ExecuteRequest method. Desbordamiento de búfer basado en pila en el control Novell iPrint Control ActiveX de ienipp.ocx en Novell iPrint Client antes de 4.34 permite a atacantes remotos ejecutar código de su elección a través de un argumento largo al método ExecuteRequest. • https://www.exploit-db.com/exploits/16514 http://download.novell.com/Download?buildid=prBBH4JpImA~ http://secunia.com/advisories/27994 http://www.securityfocus.com/bid/27939 http://www.securitytracker.com/id?1019489 http://www.vupen.com/english/advisories/2008/0639 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •