{"result": {"cve": [{"id": "CVE-2008-2431", "type": "cve", "title": "CVE-2008-2431", "description": "Multiple buffer overflows in Novell iPrint Client before 5.06 allow remote attackers to execute arbitrary code by calling the Novell iPrint ActiveX control (aka ienipp.ocx) with (1) a long third argument to the GetDriverFile method; a long first argument to the (2) GetPrinterURLList or (3) GetPrinterURLList2 method; (4) a long argument to the GetFileList method; a long argument to the (5) GetServerVersion, (6) GetResourceList, or (7) DeleteResource method, related to nipplib.dll; a long uploadPath argument to the (8) UploadPrinterDriver or (9) UploadResource method, related to URIs; (10) a long seventh argument to the UploadResource method; a long string in the (11) second, (12) third, or (13) fourth argument to the GetDriverSettings method, related to the IppGetDriverSettings function in nipplib.dll; or (14) a long eighth argument to the UploadResourceToRMS method.", "published": "2008-11-25T20:30:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2431", "cvelist": ["CVE-2008-2431"], "lastseen": "2017-08-08T11:24:41"}, {"id": "CVE-2008-2432", "type": "cve", "title": "CVE-2008-2432", "description": "Insecure method vulnerability in the GetFileList method in an unspecified ActiveX control in Novell iPrint Client before 5.06 allows remote attackers to list the image files in an arbitrary directory via a directory name in the argument.", "published": "2008-11-25T20:30:00", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-2432", "cvelist": ["CVE-2008-2432"], "lastseen": "2016-09-03T10:34:24"}], "saint": [{"id": "SAINT:98EC5383E7D8D38B5A15C94C3F18A4F8", "type": "saint", "title": "Novell iPrint ActiveX control GetDriverFile buffer overflow", "description": "Added: 09/16/2008 \nCVE: [CVE-2008-2431](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2431>) \nBID: [30813](<http://www.securityfocus.com/bid/30813>) \nOSVDB: [51684](<http://www.osvdb.org/51684>) \n\n\n### Background\n\nNovell iPrint is an application which allows users to install and manage printers. Novell iPrint installs the Novell iPrint ActiveX control named `**ienipp.ocx**`. \n\n### Problem\n\nA buffer overflow vulnerability in the Novell iPrint ActiveX control allows command execution when a user loads a web page which calls the `**GetDriverFile**` method with specially crafted arguments. \n\n### Resolution\n\nUpgrade to Novell iPrint client 5.06 or higher. \n\n### References\n\n<http://secunia.com/secunia_research/2008-27/advisory/> \n\n\n### Limitations\n\nExploit works on Novell iPrint Client 4.36.00 and requires a user to open the exploit page in Internet Explorer. \n\n### Platforms\n\nWindows \n \n\n", "published": "2008-09-16T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://download.saintcorporation.com/cgi-bin/exploit_info/novell_iprint_activex_getdriverfile", "cvelist": ["CVE-2008-2431"], "lastseen": "2016-12-14T16:58:06"}, {"id": "SAINT:278C60F772BD510E4FDAEDCAC10D8F6F", "type": "saint", "title": "Novell iPrint ActiveX control GetDriverFile buffer overflow", "description": "Added: 09/16/2008 \nCVE: [CVE-2008-2431](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2431>) \nBID: [30813](<http://www.securityfocus.com/bid/30813>) \nOSVDB: [51684](<http://www.osvdb.org/51684>) \n\n\n### Background\n\nNovell iPrint is an application which allows users to install and manage printers. Novell iPrint installs the Novell iPrint ActiveX control named `**ienipp.ocx**`. \n\n### Problem\n\nA buffer overflow vulnerability in the Novell iPrint ActiveX control allows command execution when a user loads a web page which calls the `**GetDriverFile**` method with specially crafted arguments. \n\n### Resolution\n\nUpgrade to Novell iPrint client 5.06 or higher. \n\n### References\n\n<http://secunia.com/secunia_research/2008-27/advisory/> \n\n\n### Limitations\n\nExploit works on Novell iPrint Client 4.36.00 and requires a user to open the exploit page in Internet Explorer. \n\n### Platforms\n\nWindows \n \n\n", "published": "2008-09-16T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://www.saintcorporation.com/cgi-bin/exploit_info/novell_iprint_activex_getdriverfile", "cvelist": ["CVE-2008-2431"], "lastseen": "2016-10-03T15:01:56"}, {"id": "SAINT:4B32EAD846FD3124A33898A0A68C2A32", "type": "saint", "title": "Novell iPrint ActiveX control GetDriverFile buffer overflow", "description": "Added: 09/16/2008 \nCVE: [CVE-2008-2431](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2431>) \nBID: [30813](<http://www.securityfocus.com/bid/30813>) \nOSVDB: [51684](<http://www.osvdb.org/51684>) \n\n\n### Background\n\nNovell iPrint is an application which allows users to install and manage printers. Novell iPrint installs the Novell iPrint ActiveX control named `**ienipp.ocx**`. \n\n### Problem\n\nA buffer overflow vulnerability in the Novell iPrint ActiveX control allows command execution when a user loads a web page which calls the `**GetDriverFile**` method with specially crafted arguments. \n\n### Resolution\n\nUpgrade to Novell iPrint client 5.06 or higher. \n\n### References\n\n<http://secunia.com/secunia_research/2008-27/advisory/> \n\n\n### Limitations\n\nExploit works on Novell iPrint Client 4.36.00 and requires a user to open the exploit page in Internet Explorer. \n\n### Platforms\n\nWindows \n \n\n", "published": "2008-09-16T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://my.saintcorporation.com/cgi-bin/exploit_info/novell_iprint_activex_getdriverfile", "cvelist": ["CVE-2008-2431"], "lastseen": "2017-01-10T14:03:41"}], "d2": [{"id": "D2SEC_IPRINT2", "type": "d2", "title": "DSquare Exploit Pack: D2SEC_IPRINT2", "description": "**Name**| d2sec_iprint2 \n---|--- \n**CVE**| CVE-2008-2431 \n**Exploit Pack**| [D2ExploitPack](<http://http://www.d2sec.com/products.htm>) \n**Description**| Novell iPrint Client ienipp.ocx ActiveX Stack Overflow \n**Notes**| \n", "published": "2008-11-25T20:30:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://exploitlist.immunityinc.com/home/exploitpack/D2ExploitPack/d2sec_iprint2", "cvelist": ["CVE-2008-2431"], "lastseen": "2016-09-25T14:10:42"}], "openvas": [{"id": "OPENVAS:1361412562310900040", "type": "openvas", "title": "Novell iPrint Client ActiveX Control Multiple Vulnerabilities", "description": "This host has Novell iPrint Client installed, which is prone\n to activex control vulnerabilities.", "published": "2008-08-27T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310900040", "cvelist": ["CVE-2008-2431", "CVE-2008-2432"], "lastseen": "2018-04-06T11:16:01"}, {"id": "OPENVAS:900040", "type": "openvas", "title": "Novell iPrint Client ActiveX Control Multiple Vulnerabilities", "description": "This host has Novell iPrint Client installed, which is prone\n to activex control vulnerabilities.", "published": "2008-08-27T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "http://plugins.openvas.org/nasl.php?oid=900040", "cvelist": ["CVE-2008-2431", "CVE-2008-2432"], "lastseen": "2017-07-02T21:10:10"}], "nessus": [{"id": "NOVELL_IPRINT_ACTIVEX_MULTIPLE_VULNS.NASL", "type": "nessus", "title": "Novell iPrint Client ActiveX Control Multiple Vulnerabilities", "description": "Novell iPrint Client is installed on the remote host.\n\nAn ActiveX control included with Novell iPrint Client is affected by multiple vulnerabilities.\n\n - Vulnerabilities affecting GetDriverFile(), GetDriverSettings() GetPrinterURLList(), GetFileList(), GetServerVersion(), UploadResource(), ExecuteRequest(), UploadResource(), and UploadResourceToRMS() methods in 'ienipp.ocx' could be exploited to perform stack based buffer overflows and execute arbitrary code on the remote system. (CVE-2008-2431) \n\n - A vulnerability in IppGetDriverSettings() method in nipplib.dll could be exploited to perform a stack based buffer overflow (CVE-2008-5231). \n\n - A vulnerability in GetFileList() method may disclose sensitive information. (CVE-2008-2432)", "published": "2008-08-26T00:00:00", "cvss": {"score": 9.3, "vector": "AV:NETWORK/AC:MEDIUM/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=34049", "cvelist": ["CVE-2008-2431", "CVE-2008-5231", "CVE-2008-2432"], "lastseen": "2017-10-29T13:43:44"}]}}