CVE-2010-4328
Novell iPrint LPD Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Multiple stack-based buffer overflows in opt/novell/iprint/bin/ipsmd in Novell iPrint for Linux Open Enterprise Server 2 SP2 and SP3 allow remote attackers to execute arbitrary code via unspecified LPR opcodes.
Múltiples desbordamientos de búfer basados en pila en opt/novell/iPrint/bin/ipsmd en Novell iPrint para Linux Open Enterprise Server v2 SP2 y SP3 permiten a atacantes remotos ejecutar código de su elección a través de códigos de operación LPR no especificados.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Server. Authentication is not required to exploit this vulnerability.
The flaw exists within the '/opt/novell/iprint/bin/ipsmd' component this component communicates with 'ilprsrvd' which listens on TCP port 515. When handling multiple LPR opcodes the process blindly copies user supplied data into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the iprint user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-11-29 CVE Reserved
- 2011-02-16 CVE Published
- 2011-02-18 First Exploit
- 2023-10-09 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://download.novell.com/Download?buildid=KloKR_CmrBs~ | X_refsource_confirm | |
http://osvdb.org/70852 | Vdb Entry | |
http://securityreason.com/securityalert/8096 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/516506/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/46309 | Vdb Entry | |
http://www.securitytracker.com/id?1025074 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-11-087 | X_refsource_misc |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/16192 | 2011-02-18 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/43281 | 2018-10-10 | |
http://www.novell.com/support/viewContent.do?externalId=7007858&sliceId=1 | 2018-10-10 | |
http://www.vupen.com/english/advisories/2011/0353 | 2018-10-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Novell Search vendor "Novell" | Iprint Open Enterprise Server Search vendor "Novell" for product "Iprint Open Enterprise Server" | 2 Search vendor "Novell" for product "Iprint Open Enterprise Server" and version "2" | sp2, linux |
Affected
| ||||||
Novell Search vendor "Novell" | Iprint Open Enterprise Server Search vendor "Novell" for product "Iprint Open Enterprise Server" | 2 Search vendor "Novell" for product "Iprint Open Enterprise Server" and version "2" | sp3, linux |
Affected
|