First published: Mon Jun 30 2008(Updated: )
Multiple stack-based buffer overflows in a certain ActiveX control in ienipp.ocx in Novell iPrint Client for Windows before 4.36 allow remote attackers to execute arbitrary code via a long value of the (1) operation, (2) printer-url, or (3) target-frame parameter. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell iPrint Client | <=4.35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2908 is classified as high severity due to its potential for remote code execution.
To fix CVE-2008-2908, upgrade to Novell iPrint Client version 4.36 or later.
CVE-2008-2908 affects all versions of Novell iPrint Client for Windows prior to version 4.36.
CVE-2008-2908 can be exploited through remote attacks that send specially crafted parameters to the vulnerable ActiveX control.
Exploitation of CVE-2008-2908 typically requires user interaction, such as visiting a malicious webpage.