Novell iPrint Client ActiveX Control Multiple Buffer Overflows
Data de publicação: 15 fevereiro 2011
Schweregrad: : Crítico
Identificador(es) CVE: : CVE-2008-2431
Data do informe: 15 fevereiro 2011
Descrição
Multiple buffer overflows in Novell iPrint Client before 5.06
allow remote attackers to execute arbitrary code by calling the Novell iPrint
ActiveX control (aka ienipp.ocx) with (1) a long third argument to the
GetDriverFile method; a long first argument to the (2) GetPrinterURLList or (3)
GetPrinterURLList2 method; (4) a long argument to the GetFileList method; a long
argument to the (5) GetServerVersion, (6) GetResourceList, or (7) DeleteResource
method, related to nipplib.dll; a long uploadPath argument to the (8)
UploadPrinterDriver or (9) UploadResource method, related to URIs; (10) a long
seventh argument to the UploadResource method; a long string in the (11) second,
(12) third, or (13) fourth argument to the GetDriverSettings method, related to
the IppGetDriverSettings function in nipplib.dll; or (14) a long eighth argument
to the UploadResourceToRMS method.
Exposição das informações
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Solução
Trend Micro Deep Security DPI Rule Number: 1002765
Trend Micro Deep Security DPI Rule Name: 1002765 - Novell iPrint Client ActiveX Control Multiple Buffer Overflows
Software infectado e versão:
- novell iprint 4.26
- novell iprint 4.27
- novell iprint 4.28
- novell iprint 4.30
- novell iprint 4.32
- novell iprint 4.34
- novell iprint 4.36
- novell iprint 4.38
- novell iprint 5.04