CVE-2011-4194
Novell iPrint Server attributes-natural-language Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Buffer overflow in Novell iPrint Server in Novell Open Enterprise Server 2 (OES2) through SP3 on Linux allows remote attackers to execute arbitrary code via a crafted attributes-natural-language field.
Desbordamiento de buffer en Novell iPrint Server de Novell Open Enterprise Server 2 (OES2) hasta la versión SP3 de Linux permite a atacantes remotos ejecutar código arbitrario a través de un campo attributes-natural-language modificado.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Server. Authentication is not required to exploit this vulnerability.
The flaw exists within the mod_ipp apache module component of the iprint-server, which listens by default on 631/tcp. During the handling of get-printer-attributes requests containing a attributes-natural-language attribute cause a validation routine to be hit. When validating this parameter the contents of the attribute are copied, without validation, to a fixed length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the process.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-10-25 CVE Reserved
- 2012-02-02 CVE Published
- 2024-09-16 CVE Updated
- 2024-09-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.novell.com/support/viewContent.do?externalId=7010084 | 2020-02-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Novell Search vendor "Novell" | Open Enterprise Server Search vendor "Novell" for product "Open Enterprise Server" | 2 Search vendor "Novell" for product "Open Enterprise Server" and version "2" | - |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | * | - |
Safe
|
Novell Search vendor "Novell" | Open Enterprise Server Search vendor "Novell" for product "Open Enterprise Server" | 2.0.1 Search vendor "Novell" for product "Open Enterprise Server" and version "2.0.1" | sp1 |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | * | - |
Safe
|
Novell Search vendor "Novell" | Open Enterprise Server Search vendor "Novell" for product "Open Enterprise Server" | 2.0.2 Search vendor "Novell" for product "Open Enterprise Server" and version "2.0.2" | sp2 |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | * | - |
Safe
|
Novell Search vendor "Novell" | Open Enterprise Server Search vendor "Novell" for product "Open Enterprise Server" | 2.0.3 Search vendor "Novell" for product "Open Enterprise Server" and version "2.0.3" | sp3 |
Affected
| in | Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | * | - |
Safe
|