1 results (0.003 seconds)

CVSS: 7.5EPSS: 89%CPEs: 1EXPL: 0

Stack-based buffer overflow in the GetDriverSettings function in nipplib.dll in the iPrint client in Novell Open Enterprise Server 2 (aka OES2) SP3 allows remote attackers to execute arbitrary code via a long (1) hostname or (2) port field. Desbordamiento de búfer basado en la pila en la función GetDriverSettings en nipplib.dll en el cliente iPrint en Novell Open Enterprise Server 2 (también conocido como OES2) SP3 permite a atacantes remotos ejecutar código de su elección a través de (1) 'hostname' largo o (2) 'port field'. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw exists within the nipplib.dll component. When handling the exposed method GetDriverSettings the application assembles a string for logging consisting of the hostname/port provided as a parameter. • http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5117030.html http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5117031.html http://www.novell.com/support/viewContent.do?externalId=7009676 http://www.zerodayinitiative.com/advisories/ZDI-11-309 https://bugzilla.novell.com/show_bug.cgi?id=707730 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •