Remote Code Execution Vulnerability in Novell iPrint Client
CVE-2010-4321
Currently unrated
Summary
The vulnerability in the Novell iPrint Client 5.52 involves a stack-based buffer overflow within the ActiveX control ienipp.ocx. This flaw allows remote attackers to execute arbitrary code by sending specially crafted arguments to the GetDriverSettings2 method, which can be reached through the GetDriverSettings method. Such an exploit could lead to unauthorized access and control over affected systems, posing serious security risks to users. It is crucial for organizations to patch this vulnerability to safeguard their environments.
References
EPSS Score
59% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved