Lucene search

K
zdiIvan AlmuinaZDI-10-139
HistoryAug 05, 2010 - 12:00 a.m.

Novell iPrint Client Browser Plugin Parameter Name Remote Code Execution

2010-08-0500:00:00
Ivan Almuina
www.zerodayinitiative.com
13

0.08 Low

EPSS

Percentile

94.3%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Novell iPrint Client browser plugin. User interaction is required in that a target must visit a malicious web page. The specific flaw exists within handling plugin parameters. The application does not properly verify the name of parameters passed via tags. If a malicious attacker provides a long enough value a destination buffer can be overflowed. Successful exploitation leads to execution of arbitrary code under the context of the user owning the browser process.

0.08 Low

EPSS

Percentile

94.3%