[Winvulns-announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Vulnerabilities to Windows Systems'

Notification of New Vulnerabilties to Windows Systems Fixlet Messages winvulns-announcements at bigmail.bigfix.com
Sat Aug 28 05:20:14 PDT 2010


Fixlet Site - 'Vulnerabilities to Windows Systems'
Current Version: 216	Published: Fri, 27 Aug 2010 17:32:52  GMT

New Fixlets:
============

***************************************************************
Title: Vulnerability in PluginGetDriverFile function in Novell iPrint Client before 5.44
Severity: High
Fixlet ID: 1181701
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval11817.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3105
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The PluginGetDriverFile function in Novell iPrint Client before 5.44 interprets an uninitialized memory location as a pointer value, which allows remote attackers to execute arbitrary code via unspecified vectors.

***************************************************************
Title: Buffer overflow in the browser plugin in Novell iPrint Client before 5.42
Severity: High
Fixlet ID: 1191501
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval11915.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3108
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Buffer overflow in the browser plugin in Novell iPrint Client before 5.42 allows remote attackers to execute arbitrary code by using EMBED elements to pass parameters with long names.

***************************************************************
Title: Stack-based buffer overflow in Novell iPrint Client before 5.44
Severity: High
Fixlet ID: 1197301
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval11973.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-1527
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Stack-based buffer overflow in Novell iPrint Client before 5.44 allows remote attackers to execute arbitrary code via a long call-back-url parameter in an op-client-interface-version action.

***************************************************************
Title: Denial of Service vulnerability in ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42
Severity: High
Fixlet ID: 1204401
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval12044.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3106
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method.

***************************************************************
Title: Stack-based buffer overflow in the browser plugin in Novell iPrint Client before 5.42
Severity: High
Fixlet ID: 1204601
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval12046.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3109
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: Stack-based buffer overflow in the browser plugin in Novell iPrint Client before 5.42 allows remote attackers to execute arbitrary code via a long operation parameter.

***************************************************************
Title: Denial of Service Vulnerability in certain ActiveX control in ienipp.ocx in the browser plugin in Novell iPrint Client before 5.42
Severity: High
Fixlet ID: 1207401
Fixlet Link: http://oval.mitre.org/oval/definitions/data/oval12074.html
Fixlet Link: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-3107
Fixlet Link: http://nvd.nist.gov/cvss.cfm?vectorinfo

Fixlet Description: A certain ActiveX control in ienipp.ocx in the browser plugin in Novell iPrint Client before 5.42 does not properly restrict the set of files to be deleted, which allows remote attackers to cause a denial of service (recursive file deletion) via unspecified vectors related to a "logic flaw" in the CleanUploadFiles method in the nipplib.dll module.



More information about the WinVulns-Announcements mailing list