Remote Code Execution Vulnerability in Novell iPrint Client
CVE-2010-4321

Currently unrated

Key Information:

Vendor
Novell
Vendor
CVE Published:
30 December 2010

Summary

The vulnerability in the Novell iPrint Client 5.52 involves a stack-based buffer overflow within the ActiveX control ienipp.ocx. This flaw allows remote attackers to execute arbitrary code by sending specially crafted arguments to the GetDriverSettings2 method, which can be reached through the GetDriverSettings method. Such an exploit could lead to unauthorized access and control over affected systems, posing serious security risks to users. It is crucial for organizations to patch this vulnerability to safeguard their environments.

References

EPSS Score

59% chance of being exploited in the next 30 days.

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.