| Vulnerability Name: | CCN-141214 | ||||||
| Published: | 2010-12-26 | ||||||
| Updated: | 2010-12-26 | ||||||
| Summary: | Novell iPrint Client could allow a remote attacker to execute arbitrary code on the system, caused by the failure to properly validate the Connection response length by the npnipp.dll component when parsing an HTTP response. An attacker could exploit this vulnerability to execute arbitrary code under the context of the browser. | ||||||
| CVSS v3 Severity: | 8.6 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)
| ||||||
| CVSS v2 Severity: | 9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C) 6.6 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C)
| ||||||
| Vulnerability Consequences: | Gain Access | ||||||
| References: | Source: CCN Type: Novell Web site iPrint Client for Windows XP/Vista/Win 7 5.56 Source: XF Type: UNKNOWN novell-iprint-httpconnection-code-exec(141214) Source: CCN Type: ZDI-10-300 Novell iPrint Client Netscape/ActiveX Plugin HTTP_CONNECTION Remote Code Execution Vulnerability | ||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
| BACK | |||||||