9.3
CVSSv2

CVE-2010-3106

Published: 23/08/2010 Updated: 19/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 940
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client prior to 5.42 does not properly validate the debug parameter, which allows remote malicious users to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method.

Vulnerable Product Search on Vulmon Subscribe to Product

novell iprint 4.36

novell iprint 4.38

novell iprint 4.26

novell iprint 4.27

novell iprint 5.04

novell iprint 5.30

novell iprint 4.28

novell iprint 4.30

novell iprint 5.32

novell iprint 5.20b

novell iprint 4.32

novell iprint 4.34

novell iprint 5.12

novell iprint

Exploits

This Metasploit module exploits a stack-based buffer overflow in Novell iPrint Client 540 When sending an overly long string to the 'debug' parameter in ExecuteRequest() property of ienippocx an attacker may be able to execute arbitrary code ...
## # novelliprint_executerequest_dbgrb # # Novell iPrint Client ActiveX Control 'debug' Buffer Overflow exploit for the Metasploit Framework # # Exploit successfully tested on the following platforms: # - Novell iPrint Client 532 on Internet Explorer 7, Windows XP SP3 # - Novell iPrint Client 540 on Internet Explorer 7, Windows XP SP3 # - Nov ...
## # $Id: novelliprint_executerequest_dbgrb 10429 2010-09-21 18:46:29Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## ## # nove ...