Vulnerability Description
Stack-based buffer overflow in ienipp.ocx in Novell iPrint Client 5.30, and possibly other versions before 5.32, allows remote attackers to execute arbitrary code via a long target-frame parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Novell | Iprint Client | 5.30 |
Related Weaknesses (CWE)
References
- http://download.novell.com/Download?buildid=29T3EFRky18~Patch
- http://secunia.com/advisories/37169Vendor Advisory
- http://secunia.com/secunia_research/2009-40/Vendor Advisory
- http://www.securityfocus.com/archive/1/508289/100/0/threaded
- http://www.securityfocus.com/bid/37242Patch
- http://www.vupen.com/english/advisories/2009/3429PatchVendor Advisory
- http://download.novell.com/Download?buildid=29T3EFRky18~Patch
- http://secunia.com/advisories/37169Vendor Advisory
- http://secunia.com/secunia_research/2009-40/Vendor Advisory
- http://www.securityfocus.com/archive/1/508289/100/0/threaded
- http://www.securityfocus.com/bid/37242Patch
- http://www.vupen.com/english/advisories/2009/3429PatchVendor Advisory
FAQ
What is CVE-2009-1568?
CVE-2009-1568 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in ienipp.ocx in Novell iPrint Client 5.30, and possibly other versions before 5.32, allows remote attackers to execute arbitrary code via a long target-frame parameter.
How severe is CVE-2009-1568?
CVE-2009-1568 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-1568?
Check the references section above for vendor advisories and patch information. Affected products include: Novell Iprint Client.