Gravité: : Critique
  Identifiant(s) CVE: : CVE-2008-2431
  Date du conseil: 15 février 2011

  Description

Multiple buffer overflows in Novell iPrint Client before 5.06 allow remote attackers to execute arbitrary code by calling the Novell iPrint ActiveX control (aka ienipp.ocx) with (1) a long third argument to the GetDriverFile method; a long first argument to the (2) GetPrinterURLList or (3) GetPrinterURLList2 method; (4) a long argument to the GetFileList method; a long argument to the (5) GetServerVersion, (6) GetResourceList, or (7) DeleteResource method, related to nipplib.dll; a long uploadPath argument to the (8) UploadPrinterDriver or (9) UploadResource method, related to URIs; (10) a long seventh argument to the UploadResource method; a long string in the (11) second, (12) third, or (13) fourth argument to the GetDriverSettings method, related to the IppGetDriverSettings function in nipplib.dll; or (14) a long eighth argument to the UploadResourceToRMS method.

  Information Exposure Rating:

Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.

  Solutions

  Trend Micro Deep Security DPI Rule Number: 1002765
  Trend Micro Deep Security DPI Rule Name: 1002765 - Novell iPrint Client ActiveX Control Multiple Buffer Overflows

  Affected software and version:

  • novell iprint 4.26
  • novell iprint 4.27
  • novell iprint 4.28
  • novell iprint 4.30
  • novell iprint 4.32
  • novell iprint 4.34
  • novell iprint 4.36
  • novell iprint 4.38
  • novell iprint 5.04