HTTP: Novell iPrint Client ActiveX Control Buffer Overflow

This signature detects attempts to exploit a known vulnerability in Novell iPrint Client ActiveX Control. An attacker can create a malicious Web site containing Web pages with dangerous ActiveX calls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Extended Description

Novell iPrint Client 'ienipp.ocx' ActiveX control is prone to a buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions. The issue affects iPrint Client 4.26 and 4.32; other versions may also be vulnerable.

Affected Products

Novell iprint

Short Name
HTTP:STC:ACTIVEX:IENIPP
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
ActiveX Buffer CVE-2008-0935 CVE-2008-2431 CVE-2008-2432 CVE-2008-2436 CVE-2008-2908 CVE-2008-5231 CVE-2009-1568 CVE-2009-1569 CVE-2010-1527 CVE-2010-3106 CVE-2010-4319 CVE-2010-4321 CVE-2011-3173 CVE-2011-4185 CVE-2011-4187 CVE-2013-1091 Client Control Novell Overflow bid:27939 bid:29736 bid:37242 bid:42576 bid:44966 iPrint
Release Date
02/29/2008
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Novell

CVSS Score

9.3

7.5

10.0

5.0

Found a potential security threat?