Lucene search

K
saintSAINT CorporationSAINT:AF02BA539B75C48682F62B319625DA3C
HistoryJan 03, 2011 - 12:00 a.m.

Novell iPrint Client Browser Plugin embed Tag Parameter Buffer Overflow

2011-01-0300:00:00
SAINT Corporation
my.saintcorporation.com
15

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.08 Low

EPSS

Percentile

94.3%

Added: 01/03/2011
CVE: CVE-2010-4314
BID: 45301
OSVDB: 66959

Background

Novell iPrint is an application which allows users to install and manage printers.

Problem

A buffer overflow vulnerability in Novell iPrint browser plugin allows command execution when a user loads a web page with an overly long parameter name passed via the **embed** tag.

Resolution

Upgrade to Novell iPrint Client 5.56.

References

<http://www.zerodayinitiative.com/advisories/ZDI-10-139/&gt;

Limitations

Exploit works on Novell iPrint Client 5.40 and the user must open the exploit using Mozilla Firefox 3.x on the target.

Platforms

Windows

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.08 Low

EPSS

Percentile

94.3%

Related for SAINT:AF02BA539B75C48682F62B319625DA3C