First published: Mon Feb 25 2008(Updated: )
Stack-based buffer overflow in the Novell iPrint Control ActiveX control in ienipp.ocx in Novell iPrint Client before 4.34 allows remote attackers to execute arbitrary code via a long argument to the ExecuteRequest method.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell iPrint Client | =4.26 | |
Novell Iprint | <=4.32 | |
Novell iPrint Client | =4.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0935 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2008-0935, users should upgrade to Novell iPrint Client version 4.34 or later.
CVE-2008-0935 affects Novell iPrint Client versions prior to 4.34 and Novell iPrint versions up to and including 4.32.
CVE-2008-0935 can be exploited through a stack-based buffer overflow triggered by a long argument passed to the ExecuteRequest method.
Yes, CVE-2008-0935 allows remote attackers to execute arbitrary code, making it remotely exploitable.