9.3
CVSSv2

CVE-2010-1527

Published: 23/08/2010 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 940
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in Novell iPrint Client prior to 5.44 allows remote malicious users to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version action.

Vulnerable Product Search on Vulmon Subscribe to Product

novell iprint 4.34

novell iprint 4.36

novell iprint 5.40

novell iprint

novell iprint 4.26

novell iprint 4.38

novell iprint 5.04

novell iprint 4.27

novell iprint 4.28

novell iprint 5.30

novell iprint 5.32

novell iprint 4.30

novell iprint 4.32

novell iprint 5.20b

novell iprint 5.12

Exploits

''' __ __ ____ _ _ ____ | \/ |/ __ \ /\ | | | | _ \ | \ / | | | | / \ | | | | |_) | | |\/| | | | |/ /\ \| | | | _ < | | | | |__| / ____ \ |__| | |_) | |_| |_|\____/_/ \_\____/|____/ Title : Novell iPrint Client Browser Plugin call-back-url stack overflow Version : iPrint Clien ...
## # $Id: novelliprint_callbackurlrb 10429 2010-09-21 18:46:29Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## ## # novelliprin ...
Month Of Abysssec Undisclosed Bugs - The Novell iPrint client browser plug-in suffers from a call-back-url stack overflow vulnerability ...
This Metasploit module exploits a stack-based buffer overflow in Novell iPrint Client 542 When sending an overly long string to the 'call-back-url' parameter in an op-client-interface-version action of ienippocx an attacker may be able to execute arbitrary code ...