Vulnerability Name: | CVE-2009-1569 (CCN-54606) | ||||||||
Assigned: | 2009-12-08 | ||||||||
Published: | 2009-12-08 | ||||||||
Updated: | 2018-10-10 | ||||||||
Summary: | Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions before 5.32 allow remote attackers to execute arbitrary code via vectors related to (1) Date and (2) Time. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2009-1569 Source: CCN Type: Novell Downloads Web site iPrint Client for Windows XP/Vista/Win7 5.32 Source: CONFIRM Type: Patch http://download.novell.com/Download?buildid=29T3EFRky18~ Source: CCN Type: SA35004 Novell iPrint Client Date/Time Parsing Buffer Overflow Source: SECUNIA Type: Vendor Advisory 35004 Source: CCN Type: SA37169 Novell iPrint Client Two Buffer Overflow Vulnerabilities Source: SECUNIA Type: Vendor Advisory 37169 Source: CCN Type: Secunia Research 08/12/2009 Novell iPrint Client Date/Time Parsing Buffer Overflow Source: MISC Type: Vendor Advisory http://secunia.com/secunia_research/2009-44/ Source: CCN Type: OSVDB ID: 60804 Novell iPrint Client on Windows Unspecified Time Information Overflow Source: BUGTRAQ Type: UNKNOWN 20091208 Secunia Research: Novell iPrint Client Date/Time Parsing Buffer Overflow Source: BID Type: Patch 37242 Source: CCN Type: BID-37242 Novell iPrint Client Remote Buffer Overflow Vulnerabilities Source: VUPEN Type: Patch, Vendor Advisory ADV-2009-3429 Source: XF Type: UNKNOWN novell-iprint-time-bo(54606) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |