First published: Tue Dec 08 2009(Updated: )
Stack-based buffer overflow in ienipp.ocx in Novell iPrint Client 5.30, and possibly other versions before 5.32, allows remote attackers to execute arbitrary code via a long target-frame parameter.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Novell iPrint Client | =5.30 | |
Novell iPrint Client | =5.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1568 has a high severity level due to its potential for remote code execution.
To mitigate CVE-2009-1568, upgrade to Novell iPrint Client version 5.32 or later.
CVE-2009-1568 affects Novell iPrint Client versions 5.30 and 5.31.
Yes, CVE-2009-1568 can be exploited remotely through a specially crafted target-frame parameter.
CVE-2009-1568 is a stack-based buffer overflow vulnerability.