First published: Wed Nov 26 2008(Updated: )
Stack-based buffer overflow in the ExecuteRequest method in the Novell iPrint ActiveX control in ienipp.ocx in Novell iPrint Client 5.06 and earlier allows remote attackers to execute arbitrary code via a long target-frame option value, a different vulnerability than CVE-2008-2431.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Iprint | =4.34 | |
Novell Iprint | =4.38 | |
Novell Iprint | =4.27 | |
Novell Iprint | =4.32 | |
Novell Iprint | <=5.04 | |
Novell Iprint | =4.26 | |
Novell Iprint | =4.36 | |
Novell Iprint | =4.28 | |
Novell Iprint | =4.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5231 has been rated as high severity due to its potential to allow remote code execution.
To mitigate CVE-2008-5231, update to a version of the Novell iPrint Client later than 5.04 that is not affected.
CVE-2008-5231 is caused by a stack-based buffer overflow in the ExecuteRequest method of the Novell iPrint ActiveX control.
Affected versions include Novell iPrint Client 5.06 and earlier, as well as specific versions from 4.26 to 4.38.
Yes, CVE-2008-5231 can be exploited remotely by attackers through crafted target-frame option values.