First published: Tue Dec 08 2009(Updated: )
Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions before 5.32 allow remote attackers to execute arbitrary code via vectors related to (1) Date and (2) Time.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Iprint | =4.38 | |
Novell Iprint | =5.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1569 is classified as a critical vulnerability due to the potential for remote code execution.
To fix CVE-2009-1569, upgrade the Novell iPrint Client to version 5.32 or later.
The affected versions include Novell iPrint Client 4.38 and 5.30, along with potentially other earlier versions.
CVE-2009-1569 is a stack-based buffer overflow vulnerability.
Yes, CVE-2009-1569 can be exploited remotely by attackers, which makes it particularly dangerous.