|
|
| |
Credit:
The information has been provided by Ivan Rodriguez Almuina.
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-11-179/
|
| |
Vulnerable Systems:
* Novell iPrint
User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The flaw exists within the nipplib component which is used by both the ActiveX and Netscape compatible browser plugins. When handling the iprint-client-config-info parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buffer on the stack. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the browser.
Patch Availability:
TID 7008730: Security Vulnerability - Novell iPrint nipplib.dll iprint-client-config-info Remote Code Execution Vulnerability
http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008730
CVE Information:
CVE-2011-1706
Disclosure Timeline:
2011-03-31 - Vulnerability reported to vendor
2011-06-06 - Coordinated public release of advisory
|
|
|