Multiple heap-based buffer overflows in the IppCreateServerRef function in nipplib.dll in Novell iPrint Client 4.x before 4.38 and 5.x before 5.08 allow remote attackers to execute arbitrary code via a long argument to the (1) GetPrinterURLList, (2) GetPrinterURLList2, or (3) GetFileList2 function in the Novell iPrint ActiveX control in ienipp.ocx.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://securityreason.com/securityalert/4228 | third party advisory |
http://www.securitytracker.com/id?1020806 | vdb entry |
http://secunia.com/secunia_research/2008-33/advisory | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44853 | vdb entry |
http://www.securityfocus.com/archive/1/495940/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/30986 | vdb entry |
http://www.vupen.com/english/advisories/2008/2481 | vdb entry |
http://secunia.com/advisories/31370 | third party advisory patch vendor advisory |