Search criteria

91 vulnerabilities found for iprint by novell

VAR-200804-0065

Vulnerability from variot - Updated: 2023-12-18 13:04

Novell NetWare 6.5 allows attackers to cause a denial of service (ABEND) via a crafted Macintosh iPrint client request. Novell NetWare is prone to a denial-of-service vulnerability due to an unspecified error. Remote attackers can exploit this issue to deny service to legitimate users. The issue affects Novell NetWare 6.5; other versions may also be vulnerable. ----------------------------------------------------------------------

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched.

The vulnerability is caused due to an error when processing requests e.g.

The vulnerability is reported in version 6.5.

SOLUTION: Apply updates. http://download.novell.com/Download?buildid=u0MH4z5NQts~

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: Novell (3842033): https://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200804-0065",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "iprint",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "novell",
        "version": "6.5"
      },
      {
        "model": "iprint client",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "novell",
        "version": "6.5"
      },
      {
        "model": "netware sp1.1",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "novell",
        "version": "6.5"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "apple",
        "version": "10.5.2"
      },
      {
        "model": "netware sp7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "6.5"
      },
      {
        "model": "netware sp6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "6.5"
      },
      {
        "model": "netware sp5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "6.5"
      },
      {
        "model": "netware sp4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "6.5"
      },
      {
        "model": "netware sp3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "6.5"
      },
      {
        "model": "netware sp2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "6.5"
      },
      {
        "model": "netware sp1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "6.5"
      },
      {
        "model": "netware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "novell",
        "version": "6.5"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "28561"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004313"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1701"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200804-100"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:a:novell:iprint:6.5:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-1701"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor",
    "sources": [
      {
        "db": "BID",
        "id": "28561"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200804-100"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2008-1701",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2008-1701",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-31826",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2008-1701",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200804-100",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-31826",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31826"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004313"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1701"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200804-100"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Novell NetWare 6.5 allows attackers to cause a denial of service (ABEND) via a crafted Macintosh iPrint client request. Novell NetWare is prone to a denial-of-service vulnerability due to an unspecified error. \nRemote attackers can exploit this issue to deny service to legitimate users. \nThe issue affects Novell NetWare 6.5; other versions may also be vulnerable. ----------------------------------------------------------------------\n\nA new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI\nhas been released. The new version includes many new and advanced\nfeatures, which makes it even easier to stay patched. \n\nThe vulnerability is caused due to an error when processing requests\ne.g. \n\nThe vulnerability is reported in version 6.5. \n\nSOLUTION:\nApply updates. \nhttp://download.novell.com/Download?buildid=u0MH4z5NQts~\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nNovell (3842033):\nhttps://secure-support.novell.com/KanisaPlatform/Publishing/667/3842033_f.SAL_Public.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2008-1701"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004313"
      },
      {
        "db": "BID",
        "id": "28561"
      },
      {
        "db": "VULHUB",
        "id": "VHN-31826"
      },
      {
        "db": "PACKETSTORM",
        "id": "65094"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2008-1701",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "28561",
        "trust": 2.0
      },
      {
        "db": "SECUNIA",
        "id": "29587",
        "trust": 1.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2008-1074",
        "trust": 1.7
      },
      {
        "db": "SECTRACK",
        "id": "1019750",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004313",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200804-100",
        "trust": 0.7
      },
      {
        "db": "XF",
        "id": "41588",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-31826",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "65094",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31826"
      },
      {
        "db": "BID",
        "id": "28561"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004313"
      },
      {
        "db": "PACKETSTORM",
        "id": "65094"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1701"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200804-100"
      }
    ]
  },
  "id": "VAR-200804-0065",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31826"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:04:53.605000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.novell.com/home/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004313"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004313"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1701"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "https://secure-support.novell.com/kanisaplatform/publishing/667/3842033_f.sal_public.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/28561"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id?1019750"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/29587"
      },
      {
        "trust": 1.1,
        "url": "http://www.vupen.com/english/advisories/2008/1074/references"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41588"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1701"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-1701"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/41588"
      },
      {
        "trust": 0.6,
        "url": "http://www.frsirt.com/english/advisories/2008/1074/references"
      },
      {
        "trust": 0.3,
        "url": "http://www.novell.com"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/29587/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "https://psi.secunia.com/?page=changelog"
      },
      {
        "trust": 0.1,
        "url": "https://psi.secunia.com/"
      },
      {
        "trust": 0.1,
        "url": "http://download.novell.com/download?buildid=u0mh4z5nqts~"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/78/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-31826"
      },
      {
        "db": "BID",
        "id": "28561"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004313"
      },
      {
        "db": "PACKETSTORM",
        "id": "65094"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1701"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200804-100"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-31826"
      },
      {
        "db": "BID",
        "id": "28561"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004313"
      },
      {
        "db": "PACKETSTORM",
        "id": "65094"
      },
      {
        "db": "NVD",
        "id": "CVE-2008-1701"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200804-100"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2008-04-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-31826"
      },
      {
        "date": "2008-04-01T00:00:00",
        "db": "BID",
        "id": "28561"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-004313"
      },
      {
        "date": "2008-04-03T04:45:58",
        "db": "PACKETSTORM",
        "id": "65094"
      },
      {
        "date": "2008-04-08T18:05:00",
        "db": "NVD",
        "id": "CVE-2008-1701"
      },
      {
        "date": "2008-04-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200804-100"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-08T00:00:00",
        "db": "VULHUB",
        "id": "VHN-31826"
      },
      {
        "date": "2015-05-07T17:30:00",
        "db": "BID",
        "id": "28561"
      },
      {
        "date": "2012-09-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2008-004313"
      },
      {
        "date": "2017-08-08T01:30:22.777000",
        "db": "NVD",
        "id": "CVE-2008-1701"
      },
      {
        "date": "2008-09-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200804-100"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200804-100"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Novell NetWare Service disruption in  (DoS) Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2008-004313"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200804-100"
      }
    ],
    "trust": 0.6
  }
}

FKIE_CVE-2010-4314

Vulnerability from fkie_nvd - Published: 2017-03-11 06:59 - Updated: 2025-04-20 01:37
Summary
Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the "name" parameter.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "583C6EB4-A372-4B15-8B3A-09A0D778ECA3",
              "versionEndIncluding": "5.40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CAEEA81-5037-4B68-98D9-83AAEBC98E20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B47EBFCC-1828-45AB-BC6D-FB980929A81A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the \"name\" parameter."
    },
    {
      "lang": "es",
      "value": "Atacantes remotos puede utilizar el plugin ActiveX del navegador web de iPrint en Novell iPrint Client en versiones anteriores a 5.42 para Windows XP/Vista/Win7 para ejecutar c\u00f3digo desbordando el par\u00e1metro \"name\"."
    }
  ],
  "id": "CVE-2010-4314",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-11T06:59:00.150",
  "references": [
    {
      "source": "security@opentext.com",
      "url": "https://www.novell.com/support/kb/doc.php?id=7006675"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.novell.com/support/kb/doc.php?id=7006675"
    }
  ],
  "sourceIdentifier": "security@opentext.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-3708

Vulnerability from fkie_nvd - Published: 2013-12-01 04:31 - Updated: 2025-04-11 00:51
Severity ?
Summary
The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:-:*:*:*:windows_7:*:*",
              "matchCriteriaId": "FC81F285-9177-430C-AAA3-31996323365D",
              "versionEndIncluding": "5.90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:-:*:*:*:windows_8:*:*",
              "matchCriteriaId": "AF2922F3-33F6-4D2B-B5D6-9DBDD49D86FA",
              "versionEndIncluding": "5.90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:-:*:*:*:windows_vista:*:*",
              "matchCriteriaId": "A723CB81-D4F8-4DBA-B19F-E7522BE42D0D",
              "versionEndIncluding": "5.90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:-:*:*:*:windows_xp:*:*",
              "matchCriteriaId": "C5DEED0E-0EEB-4EB6-A802-6BB8E9E3FD4D",
              "versionEndIncluding": "5.90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2125DEA-9648-4921-B8BB-259D05EF40F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "46CBBCF9-8C1D-4670-BBC9-1B2413978C4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "F823A271-6EDE-4AD8-9448-57B6E04A96F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "62795E20-0BDB-4F00-8B47-49A10AD4AEA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D610B2-32AB-40EF-8AE3-3AC3E407F69E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "736F04E7-4A34-4787-9C69-6ABB10AC7759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE6F47E-BA31-4850-B7A8-11AFBC9B3BE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "44E0B886-1A97-4B86-AD18-F7BECB1BEACD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n id1.GetPrinterURLList en Novell iPrint Client anterior a la versi\u00f3n 5.93 permite a atancantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2013-3708",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-12-01T04:31:49.630",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/kb/doc.php?id=7014184"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.novell.com/show_bug.cgi?id=848735"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/kb/doc.php?id=7014184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.novell.com/show_bug.cgi?id=848735"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2013-1091

Vulnerability from fkie_nvd - Published: 2013-05-02 18:55 - Updated: 2025-04-11 00:51

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2BADD7E-3CBD-4A32-A881-6D3A51AD7B52",
              "versionEndIncluding": "5.86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2125DEA-9648-4921-B8BB-259D05EF40F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "46CBBCF9-8C1D-4670-BBC9-1B2413978C4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "F823A271-6EDE-4AD8-9448-57B6E04A96F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "62795E20-0BDB-4F00-8B47-49A10AD4AEA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D610B2-32AB-40EF-8AE3-3AC3E407F69E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.78:*:*:*:*:*:*:*",
              "matchCriteriaId": "736F04E7-4A34-4787-9C69-6ABB10AC7759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE6F47E-BA31-4850-B7A8-11AFBC9B3BE0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Desbordamiento basado en pila en Novell iPrint Client anterior a v5.90 que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2013-1091",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-05-02T18:55:05.473",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://download.novell.com/Download?buildid=k6yH0sy992E~"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/kb/doc.php?id=7012344"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/59612"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.novell.com/show_bug.cgi?id=800593"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://download.novell.com/Download?buildid=k6yH0sy992E~"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/kb/doc.php?id=7012344"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/59612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.novell.com/show_bug.cgi?id=800593"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-0411

Vulnerability from fkie_nvd - Published: 2012-12-24 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC0C14F8-AA34-48FC-BCF9-4EC84958E0B9",
              "versionEndIncluding": "5.78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2125DEA-9648-4921-B8BB-259D05EF40F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "46CBBCF9-8C1D-4670-BBC9-1B2413978C4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "F823A271-6EDE-4AD8-9448-57B6E04A96F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "62795E20-0BDB-4F00-8B47-49A10AD4AEA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2D610B2-32AB-40EF-8AE3-3AC3E407F69E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en el cliente de Novell iPrint antes de v5.82 Permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una acci\u00f3n op-client-interface-version.\r\n"
    }
  ],
  "id": "CVE-2012-0411",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-12-24T18:55:01.883",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/kb/doc.php?id=7008708"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/kb/doc.php?id=7008708"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-4187

Vulnerability from fkie_nvd - Published: 2012-02-21 13:31 - Updated: 2025-04-11 00:51
Severity ?
Summary
Buffer overflow in the GetDriverSettings function in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a long realm field, a different vulnerability than CVE-2011-3173.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5EF91A6-8930-4DAE-A1D9-BBB92D109282",
              "versionEndIncluding": "5.74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2125DEA-9648-4921-B8BB-259D05EF40F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "46CBBCF9-8C1D-4670-BBC9-1B2413978C4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "F823A271-6EDE-4AD8-9448-57B6E04A96F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "62795E20-0BDB-4F00-8B47-49A10AD4AEA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the GetDriverSettings function in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a long realm field, a different vulnerability than CVE-2011-3173."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en la funci\u00f3n GetDriverSettings en ??nipplib.dll en el cliente de Novell iPrint antes de v5.78 en Windows permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un campo de dominio de largo. Se trata de una vulnerabilidad diferente a CVE-2011-3173."
    }
  ],
  "id": "CVE-2011-4187",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-02-21T13:31:35.017",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/viewContent.do?externalId=7010143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/viewContent.do?externalId=7010143"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-4186

Vulnerability from fkie_nvd - Published: 2012-02-21 13:31 - Updated: 2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url, a different vulnerability than CVE-2011-1705.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5EF91A6-8930-4DAE-A1D9-BBB92D109282",
              "versionEndIncluding": "5.74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2125DEA-9648-4921-B8BB-259D05EF40F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "46CBBCF9-8C1D-4670-BBC9-1B2413978C4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "F823A271-6EDE-4AD8-9448-57B6E04A96F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "62795E20-0BDB-4F00-8B47-49A10AD4AEA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url, a different vulnerability than CVE-2011-1705."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de desbordamiento de pila basado en b\u00fafer en nipplib.dll en el cliente de Novell iPrint antes de v5.78 bajo Windows permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un par\u00e1metro client-file-name (nombre de archivo cliente) en una URL de impresora. Se trata de una vulnerabilidad diferente a CVE-2011-1705."
    }
  ],
  "id": "CVE-2011-4186",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-02-21T13:31:34.970",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/viewContent.do?externalId=7010145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/viewContent.do?externalId=7010145"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-4185

Vulnerability from fkie_nvd - Published: 2012-02-21 13:31 - Updated: 2025-04-11 00:51
Severity ?
Summary
The GetPrinterURLList2 method in the ActiveX control in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2008-2431 and CVE-2008-2436.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5EF91A6-8930-4DAE-A1D9-BBB92D109282",
              "versionEndIncluding": "5.74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2125DEA-9648-4921-B8BB-259D05EF40F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.64:*:*:*:*:*:*:*",
              "matchCriteriaId": "46CBBCF9-8C1D-4670-BBC9-1B2413978C4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.68:*:*:*:*:*:*:*",
              "matchCriteriaId": "F823A271-6EDE-4AD8-9448-57B6E04A96F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "62795E20-0BDB-4F00-8B47-49A10AD4AEA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The GetPrinterURLList2 method in the ActiveX control in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2008-2431 and CVE-2008-2436."
    },
    {
      "lang": "es",
      "value": "El m\u00e9todo GetPrinterURLList2 en el control ActiveX del cliente de Novell iPrint Client anteriores a v5.78 en Windows permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de vectores no especificados, una vulnerabilidad diferente a CVE-2008-2431 y CVE-2008-2436."
    }
  ],
  "id": "CVE-2011-4185",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-02-21T13:31:34.923",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/viewContent.do?externalId=7010144"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/viewContent.do?externalId=7010144"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-1708

Vulnerability from fkie_nvd - Published: 2011-06-09 21:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs cookie.
Impacted products
Vendor Product Version
novell iprint *
novell iprint 4.26
novell iprint 4.27
novell iprint 4.28
novell iprint 4.30
novell iprint 4.32
novell iprint 4.34
novell iprint 4.36
novell iprint 4.38
novell iprint 5.04
novell iprint 5.12
novell iprint 5.20b
novell iprint 5.30
novell iprint 5.32
novell iprint 5.40
novell iprint 5.42
novell iprint 5.44
novell iprint 5.50
novell iprint 5.52
novell iprint 5.56

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506",
              "versionEndIncluding": "5.60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs cookie."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en nipplib.dll de Novell iPrint Client antes de v5.64, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una cookie manipulada en op-printer-list-all-jobs\r\n"
    }
  ],
  "id": "CVE-2011-1708",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-06-09T21:55:00.963",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/44811"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/518274/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/48124"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1025606"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://zerodayinitiative.com/advisories/ZDI-11-180/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67882"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/518274/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://zerodayinitiative.com/advisories/ZDI-11-180/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67882"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-1707

Vulnerability from fkie_nvd - Published: 2011-06-09 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs parameter in a printer-url.
Impacted products
Vendor Product Version
novell iprint *
novell iprint 4.26
novell iprint 4.27
novell iprint 4.28
novell iprint 4.30
novell iprint 4.32
novell iprint 4.34
novell iprint 4.36
novell iprint 4.38
novell iprint 5.04
novell iprint 5.12
novell iprint 5.20b
novell iprint 5.30
novell iprint 5.32
novell iprint 5.40
novell iprint 5.42
novell iprint 5.44
novell iprint 5.50
novell iprint 5.52
novell iprint 5.56

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506",
              "versionEndIncluding": "5.60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs parameter in a printer-url."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en nipplib.dll en Novell iPrint Client anterior a v5.64 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del par\u00e1metro manipulado op-printer-list-all-jobs en un printer-url."
    }
  ],
  "id": "CVE-2011-1707",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-06-09T19:55:01.807",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/44811"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/518275/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/48124"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1025606"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://zerodayinitiative.com/advisories/ZDI-11-181/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67883"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/518275/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://zerodayinitiative.com/advisories/ZDI-11-181/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67883"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-1704

Vulnerability from fkie_nvd - Published: 2011-06-09 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted core-package parameter in a printer-url.
Impacted products
Vendor Product Version
novell iprint *
novell iprint 4.26
novell iprint 4.27
novell iprint 4.28
novell iprint 4.30
novell iprint 4.32
novell iprint 4.34
novell iprint 4.36
novell iprint 4.38
novell iprint 5.04
novell iprint 5.12
novell iprint 5.20b
novell iprint 5.30
novell iprint 5.32
novell iprint 5.40
novell iprint 5.42
novell iprint 5.44
novell iprint 5.50
novell iprint 5.52
novell iprint 5.56

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506",
              "versionEndIncluding": "5.60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted core-package parameter in a printer-url."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en nipplib.dll en Novell iPrint Client anterior a v5.64 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del par\u00e1metro manipulado core-package en un printer-url."
    }
  ],
  "id": "CVE-2011-1704",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-06-09T19:55:01.587",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/44811"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008728"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/518268/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/48124"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1025606"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://zerodayinitiative.com/advisories/ZDI-11-177/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67879"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008728"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/518268/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://zerodayinitiative.com/advisories/ZDI-11-177/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67879"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-1699

Vulnerability from fkie_nvd - Published: 2011-06-09 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted uri parameter in a printer-url.
Impacted products
Vendor Product Version
novell iprint *
novell iprint 4.26
novell iprint 4.27
novell iprint 4.28
novell iprint 4.30
novell iprint 4.32
novell iprint 4.34
novell iprint 4.36
novell iprint 4.38
novell iprint 5.04
novell iprint 5.12
novell iprint 5.20b
novell iprint 5.30
novell iprint 5.32
novell iprint 5.40
novell iprint 5.42
novell iprint 5.44
novell iprint 5.50
novell iprint 5.52
novell iprint 5.56

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506",
              "versionEndIncluding": "5.60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted uri parameter in a printer-url."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en nipplib.dll en Novell iPrint Client anterior a v5.64 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del par\u00e1metro manipulado uri en un printer-url."
    }
  ],
  "id": "CVE-2011-1699",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-06-09T19:55:01.367",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/44811"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008720"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/518266/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/48124"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1025606"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://zerodayinitiative.com/advisories/ZDI-11-172/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008720"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/518266/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://zerodayinitiative.com/advisories/ZDI-11-172/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-1706

Vulnerability from fkie_nvd - Published: 2011-06-09 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted iprint-client-config-info parameter in a printer-url.
Impacted products
Vendor Product Version
novell iprint *
novell iprint 4.26
novell iprint 4.27
novell iprint 4.28
novell iprint 4.30
novell iprint 4.32
novell iprint 4.34
novell iprint 4.36
novell iprint 4.38
novell iprint 5.04
novell iprint 5.12
novell iprint 5.20b
novell iprint 5.30
novell iprint 5.32
novell iprint 5.40
novell iprint 5.42
novell iprint 5.44
novell iprint 5.50
novell iprint 5.52
novell iprint 5.56

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506",
              "versionEndIncluding": "5.60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted iprint-client-config-info parameter in a printer-url."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en nipplib.dll en Novell iPrint Client anterior a v5.64 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del par\u00e1metro manipulado iprint-client-config-info en un printer-url."
    }
  ],
  "id": "CVE-2011-1706",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-06-09T19:55:01.713",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/44811"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008730"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/518273/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/48124"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1025606"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://zerodayinitiative.com/advisories/ZDI-11-179/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67881"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008730"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/518273/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://zerodayinitiative.com/advisories/ZDI-11-179/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67881"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-1703

Vulnerability from fkie_nvd - Published: 2011-06-09 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted driver-version parameter in a printer-url.
Impacted products
Vendor Product Version
novell iprint *
novell iprint 4.26
novell iprint 4.27
novell iprint 4.28
novell iprint 4.30
novell iprint 4.32
novell iprint 4.34
novell iprint 4.36
novell iprint 4.38
novell iprint 5.04
novell iprint 5.12
novell iprint 5.20b
novell iprint 5.30
novell iprint 5.32
novell iprint 5.40
novell iprint 5.42
novell iprint 5.44
novell iprint 5.50
novell iprint 5.52
novell iprint 5.56

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:novell:iprint:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5518821A-F681-495A-8043-27ECF8ACC506",
              "versionEndIncluding": "5.60",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "3332CB43-D2ED-4720-8ED4-AE222C6F7FF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AD9057-2218-481E-96CB-BF568AD3A9F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D044326-00CB-4158-A652-7D7FBDB380C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BDA0CD3-3E49-42E9-8D41-2B93FEE53610",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAB01661-76E1-4181-A798-6325EFD681FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "16769BC0-66AE-4AA3-B504-03389717A56D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B2994C-8E01-4E7B-A5CA-9F9BE4C634C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:4.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCCA90D8-A320-43B0-A667-DAFC0D00924F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F12CAA5-6C37-4FBA-BA41-03C7F81AE6BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCA3CFFD-8D4B-4BEC-934A-7E5D18F87807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2A31E77-BFE6-4F54-9839-8323F8E4995E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8EC466-1CA2-4D8E-8D3F-F1246DC1850B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "27533465-909A-4300-A713-36924FB330CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA155873-6210-4775-8CCA-7413F7DD172C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "177AFE43-3B8A-49FD-B91F-20BA1DCD2B10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2CE3262-2CC1-450D-B2C1-4BB4C239F435",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FCF72D3-9B10-4E31-8575-FDE0DB1A72E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "634E2701-AE87-4F85-8F1D-DE732FB20E22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:novell:iprint:5.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "E102B7A1-13DD-4A62-8DFB-A59D3D14DFCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted driver-version parameter in a printer-url."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica  en nipplib.dll en Novell iPrint Client v5.64 ,permite a atacantes remotos  ejecutar c\u00f3digo arbitrario a trav\u00e9s de un par\u00e1metro driver-version manipulado en una url de impresora.\r\n"
    }
  ],
  "id": "CVE-2011-1703",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-06-09T19:55:01.557",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/44811"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008727"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/518271/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/48124"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1025606"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://zerodayinitiative.com/advisories/ZDI-11-176/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67878"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008727"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/518271/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://zerodayinitiative.com/advisories/ZDI-11-176/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67878"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2010-4314 (GCVE-0-2010-4314)

Vulnerability from cvelistv5 – Published: 2017-03-11 06:46 – Updated: 2024-08-07 03:43
VLAI?
Summary
Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the "name" parameter.
Severity ?
No CVSS data available.
CWE
  • buffer overflow
Assigner
References
Impacted products
Vendor Product Version
n/a Novell iPrint webrowser ActiveX plugin Affected: Novell iPrint webrowser ActiveX plugin
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:43:13.676Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.novell.com/support/kb/doc.php?id=7006675"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Novell iPrint webrowser ActiveX plugin",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Novell iPrint webrowser ActiveX plugin"
            }
          ]
        }
      ],
      "datePublic": "2017-03-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the \"name\" parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "buffer overflow",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-06T16:15:39",
        "orgId": "f81092c5-7f14-476d-80dc-24857f90be84",
        "shortName": "microfocus"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.novell.com/support/kb/doc.php?id=7006675"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@microfocus.com",
          "ID": "CVE-2010-4314",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Novell iPrint webrowser ActiveX plugin",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Novell iPrint webrowser ActiveX plugin"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the \"name\" parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "buffer overflow"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.novell.com/support/kb/doc.php?id=7006675",
              "refsource": "CONFIRM",
              "url": "https://www.novell.com/support/kb/doc.php?id=7006675"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84",
    "assignerShortName": "microfocus",
    "cveId": "CVE-2010-4314",
    "datePublished": "2017-03-11T06:46:00",
    "dateReserved": "2010-11-29T00:00:00",
    "dateUpdated": "2024-08-07T03:43:13.676Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-3708 (GCVE-0-2013-3708)

Vulnerability from cvelistv5 – Published: 2013-12-01 02:00 – Updated: 2024-08-06 16:14
VLAI?
Summary
The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:14:56.698Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/kb/doc.php?id=7014184"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.novell.com/show_bug.cgi?id=848735"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-01T17:26:34",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/kb/doc.php?id=7014184"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.novell.com/show_bug.cgi?id=848735"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-3708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.novell.com/support/kb/doc.php?id=7014184",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/kb/doc.php?id=7014184"
            },
            {
              "name": "https://bugzilla.novell.com/show_bug.cgi?id=848735",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.novell.com/show_bug.cgi?id=848735"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-3708",
    "datePublished": "2013-12-01T02:00:00",
    "dateReserved": "2013-05-30T00:00:00",
    "dateUpdated": "2024-08-06T16:14:56.698Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-1091 (GCVE-0-2013-1091)

Vulnerability from cvelistv5 – Published: 2013-05-02 18:00 – Updated: 2024-08-06 14:49
VLAI?
Summary
Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:49:20.597Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "59612",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/59612"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/kb/doc.php?id=7012344"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.novell.com/show_bug.cgi?id=800593"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://download.novell.com/Download?buildid=k6yH0sy992E~"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-05-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-05-12T18:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "59612",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/59612"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/kb/doc.php?id=7012344"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.novell.com/show_bug.cgi?id=800593"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://download.novell.com/Download?buildid=k6yH0sy992E~"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-1091",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "59612",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/59612"
            },
            {
              "name": "http://www.novell.com/support/kb/doc.php?id=7012344",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/kb/doc.php?id=7012344"
            },
            {
              "name": "https://bugzilla.novell.com/show_bug.cgi?id=800593",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.novell.com/show_bug.cgi?id=800593"
            },
            {
              "name": "http://download.novell.com/Download?buildid=k6yH0sy992E~",
              "refsource": "CONFIRM",
              "url": "http://download.novell.com/Download?buildid=k6yH0sy992E~"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-1091",
    "datePublished": "2013-05-02T18:00:00",
    "dateReserved": "2013-01-11T00:00:00",
    "dateUpdated": "2024-08-06T14:49:20.597Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0411 (GCVE-0-2012-0411)

Vulnerability from cvelistv5 – Published: 2012-12-24 18:00 – Updated: 2024-09-16 19:56
VLAI?
Summary
Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:23:31.001Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/kb/doc.php?id=7008708"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-12-24T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/kb/doc.php?id=7008708"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-0411",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.novell.com/support/kb/doc.php?id=7008708",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/kb/doc.php?id=7008708"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-0411",
    "datePublished": "2012-12-24T18:00:00Z",
    "dateReserved": "2012-01-09T00:00:00Z",
    "dateUpdated": "2024-09-16T19:56:58.256Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-4186 (GCVE-0-2011-4186)

Vulnerability from cvelistv5 – Published: 2012-02-20 21:00 – Updated: 2024-09-17 00:46
VLAI?
Summary
Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url, a different vulnerability than CVE-2011-1705.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:01:51.163Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/viewContent.do?externalId=7010145"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url, a different vulnerability than CVE-2011-1705."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-02-20T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/viewContent.do?externalId=7010145"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-4186",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url, a different vulnerability than CVE-2011-1705."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.novell.com/support/viewContent.do?externalId=7008708",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
            },
            {
              "name": "http://www.novell.com/support/viewContent.do?externalId=7010145",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/viewContent.do?externalId=7010145"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-4186",
    "datePublished": "2012-02-20T21:00:00Z",
    "dateReserved": "2011-10-25T00:00:00Z",
    "dateUpdated": "2024-09-17T00:46:13.811Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-4185 (GCVE-0-2011-4185)

Vulnerability from cvelistv5 – Published: 2012-02-20 21:00 – Updated: 2024-09-16 23:51
VLAI?
Summary
The GetPrinterURLList2 method in the ActiveX control in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2008-2431 and CVE-2008-2436.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:01:50.974Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/viewContent.do?externalId=7010144"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The GetPrinterURLList2 method in the ActiveX control in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2008-2431 and CVE-2008-2436."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-02-20T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/viewContent.do?externalId=7010144"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-4185",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The GetPrinterURLList2 method in the ActiveX control in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2008-2431 and CVE-2008-2436."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.novell.com/support/viewContent.do?externalId=7010144",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/viewContent.do?externalId=7010144"
            },
            {
              "name": "http://www.novell.com/support/viewContent.do?externalId=7008708",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-4185",
    "datePublished": "2012-02-20T21:00:00Z",
    "dateReserved": "2011-10-25T00:00:00Z",
    "dateUpdated": "2024-09-16T23:51:50.077Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-4187 (GCVE-0-2011-4187)

Vulnerability from cvelistv5 – Published: 2012-02-20 21:00 – Updated: 2024-09-16 18:08
VLAI?
Summary
Buffer overflow in the GetDriverSettings function in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a long realm field, a different vulnerability than CVE-2011-3173.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:01:51.258Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/viewContent.do?externalId=7010143"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the GetDriverSettings function in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a long realm field, a different vulnerability than CVE-2011-3173."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-02-20T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/viewContent.do?externalId=7010143"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-4187",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the GetDriverSettings function in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a long realm field, a different vulnerability than CVE-2011-3173."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.novell.com/support/viewContent.do?externalId=7010143",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/viewContent.do?externalId=7010143"
            },
            {
              "name": "http://www.novell.com/support/viewContent.do?externalId=7008708",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-4187",
    "datePublished": "2012-02-20T21:00:00Z",
    "dateReserved": "2011-10-25T00:00:00Z",
    "dateUpdated": "2024-09-16T18:08:04.183Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1708 (GCVE-0-2011-1708)

Vulnerability from cvelistv5 – Published: 2011-06-09 21:00 – Updated: 2024-08-06 22:37
VLAI?
Summary
Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs cookie.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025606",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025606"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://zerodayinitiative.com/advisories/ZDI-11-180/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
          },
          {
            "name": "novell-iprint-opprinterlistalljobs-cookie-bo(67882)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67882"
          },
          {
            "name": "44811",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44811"
          },
          {
            "name": "48124",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48124"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731"
          },
          {
            "name": "20110606 ZDI-11-180: Novell iPrint op-printer-list-all-jobs cookie Remote Code Execution Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/518274/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-06-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs cookie."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1025606",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025606"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://zerodayinitiative.com/advisories/ZDI-11-180/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
        },
        {
          "name": "novell-iprint-opprinterlistalljobs-cookie-bo(67882)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67882"
        },
        {
          "name": "44811",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44811"
        },
        {
          "name": "48124",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48124"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731"
        },
        {
          "name": "20110606 ZDI-11-180: Novell iPrint op-printer-list-all-jobs cookie Remote Code Execution Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/518274/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs cookie."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025606",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025606"
            },
            {
              "name": "http://zerodayinitiative.com/advisories/ZDI-11-180/",
              "refsource": "MISC",
              "url": "http://zerodayinitiative.com/advisories/ZDI-11-180/"
            },
            {
              "name": "http://download.novell.com/Download?buildid=6_bNby38ERg~",
              "refsource": "CONFIRM",
              "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
            },
            {
              "name": "novell-iprint-opprinterlistalljobs-cookie-bo(67882)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67882"
            },
            {
              "name": "44811",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44811"
            },
            {
              "name": "48124",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/48124"
            },
            {
              "name": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731"
            },
            {
              "name": "20110606 ZDI-11-180: Novell iPrint op-printer-list-all-jobs cookie Remote Code Execution Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/518274/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1708",
    "datePublished": "2011-06-09T21:00:00",
    "dateReserved": "2011-04-15T00:00:00",
    "dateUpdated": "2024-08-06T22:37:25.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-4314 (GCVE-0-2010-4314)

Vulnerability from nvd – Published: 2017-03-11 06:46 – Updated: 2024-08-07 03:43
VLAI?
Summary
Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the "name" parameter.
Severity ?
No CVSS data available.
CWE
  • buffer overflow
Assigner
References
Impacted products
Vendor Product Version
n/a Novell iPrint webrowser ActiveX plugin Affected: Novell iPrint webrowser ActiveX plugin
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:43:13.676Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.novell.com/support/kb/doc.php?id=7006675"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Novell iPrint webrowser ActiveX plugin",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Novell iPrint webrowser ActiveX plugin"
            }
          ]
        }
      ],
      "datePublic": "2017-03-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the \"name\" parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "buffer overflow",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-06T16:15:39",
        "orgId": "f81092c5-7f14-476d-80dc-24857f90be84",
        "shortName": "microfocus"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.novell.com/support/kb/doc.php?id=7006675"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@microfocus.com",
          "ID": "CVE-2010-4314",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Novell iPrint webrowser ActiveX plugin",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Novell iPrint webrowser ActiveX plugin"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Remote attackers can use the iPrint web-browser ActiveX plugin in Novell iPrint Client before 5.42 for Windows XP/Vista/Win7 to execute code by overflowing the \"name\" parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "buffer overflow"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.novell.com/support/kb/doc.php?id=7006675",
              "refsource": "CONFIRM",
              "url": "https://www.novell.com/support/kb/doc.php?id=7006675"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f81092c5-7f14-476d-80dc-24857f90be84",
    "assignerShortName": "microfocus",
    "cveId": "CVE-2010-4314",
    "datePublished": "2017-03-11T06:46:00",
    "dateReserved": "2010-11-29T00:00:00",
    "dateUpdated": "2024-08-07T03:43:13.676Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-3708 (GCVE-0-2013-3708)

Vulnerability from nvd – Published: 2013-12-01 02:00 – Updated: 2024-08-06 16:14
VLAI?
Summary
The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:14:56.698Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/kb/doc.php?id=7014184"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.novell.com/show_bug.cgi?id=848735"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-01T17:26:34",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/kb/doc.php?id=7014184"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.novell.com/show_bug.cgi?id=848735"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-3708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The id1.GetPrinterURLList function in Novell iPrint Client before 5.93 allows remote attackers to cause a denial of service via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.novell.com/support/kb/doc.php?id=7014184",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/kb/doc.php?id=7014184"
            },
            {
              "name": "https://bugzilla.novell.com/show_bug.cgi?id=848735",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.novell.com/show_bug.cgi?id=848735"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-3708",
    "datePublished": "2013-12-01T02:00:00",
    "dateReserved": "2013-05-30T00:00:00",
    "dateUpdated": "2024-08-06T16:14:56.698Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-1091 (GCVE-0-2013-1091)

Vulnerability from nvd – Published: 2013-05-02 18:00 – Updated: 2024-08-06 14:49
VLAI?
Summary
Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:49:20.597Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "59612",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/59612"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/kb/doc.php?id=7012344"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.novell.com/show_bug.cgi?id=800593"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://download.novell.com/Download?buildid=k6yH0sy992E~"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-05-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-05-12T18:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "59612",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/59612"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/kb/doc.php?id=7012344"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.novell.com/show_bug.cgi?id=800593"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://download.novell.com/Download?buildid=k6yH0sy992E~"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-1091",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in Novell iPrint Client before 5.90 allows remote attackers to execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "59612",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/59612"
            },
            {
              "name": "http://www.novell.com/support/kb/doc.php?id=7012344",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/kb/doc.php?id=7012344"
            },
            {
              "name": "https://bugzilla.novell.com/show_bug.cgi?id=800593",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.novell.com/show_bug.cgi?id=800593"
            },
            {
              "name": "http://download.novell.com/Download?buildid=k6yH0sy992E~",
              "refsource": "CONFIRM",
              "url": "http://download.novell.com/Download?buildid=k6yH0sy992E~"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-1091",
    "datePublished": "2013-05-02T18:00:00",
    "dateReserved": "2013-01-11T00:00:00",
    "dateUpdated": "2024-08-06T14:49:20.597Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0411 (GCVE-0-2012-0411)

Vulnerability from nvd – Published: 2012-12-24 18:00 – Updated: 2024-09-16 19:56
VLAI?
Summary
Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:23:31.001Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/kb/doc.php?id=7008708"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-12-24T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/kb/doc.php?id=7008708"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-0411",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Novell iPrint Client before 5.82 allows remote attackers to execute arbitrary code via an op-client-interface-version action."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.novell.com/support/kb/doc.php?id=7008708",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/kb/doc.php?id=7008708"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-0411",
    "datePublished": "2012-12-24T18:00:00Z",
    "dateReserved": "2012-01-09T00:00:00Z",
    "dateUpdated": "2024-09-16T19:56:58.256Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-4186 (GCVE-0-2011-4186)

Vulnerability from nvd – Published: 2012-02-20 21:00 – Updated: 2024-09-17 00:46
VLAI?
Summary
Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url, a different vulnerability than CVE-2011-1705.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:01:51.163Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/viewContent.do?externalId=7010145"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url, a different vulnerability than CVE-2011-1705."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-02-20T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/viewContent.do?externalId=7010145"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-4186",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a crafted client-file-name parameter in a printer-url, a different vulnerability than CVE-2011-1705."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.novell.com/support/viewContent.do?externalId=7008708",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
            },
            {
              "name": "http://www.novell.com/support/viewContent.do?externalId=7010145",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/viewContent.do?externalId=7010145"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-4186",
    "datePublished": "2012-02-20T21:00:00Z",
    "dateReserved": "2011-10-25T00:00:00Z",
    "dateUpdated": "2024-09-17T00:46:13.811Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-4185 (GCVE-0-2011-4185)

Vulnerability from nvd – Published: 2012-02-20 21:00 – Updated: 2024-09-16 23:51
VLAI?
Summary
The GetPrinterURLList2 method in the ActiveX control in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2008-2431 and CVE-2008-2436.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:01:50.974Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/viewContent.do?externalId=7010144"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The GetPrinterURLList2 method in the ActiveX control in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2008-2431 and CVE-2008-2436."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-02-20T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/viewContent.do?externalId=7010144"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-4185",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The GetPrinterURLList2 method in the ActiveX control in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2008-2431 and CVE-2008-2436."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.novell.com/support/viewContent.do?externalId=7010144",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/viewContent.do?externalId=7010144"
            },
            {
              "name": "http://www.novell.com/support/viewContent.do?externalId=7008708",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-4185",
    "datePublished": "2012-02-20T21:00:00Z",
    "dateReserved": "2011-10-25T00:00:00Z",
    "dateUpdated": "2024-09-16T23:51:50.077Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-4187 (GCVE-0-2011-4187)

Vulnerability from nvd – Published: 2012-02-20 21:00 – Updated: 2024-09-16 18:08
VLAI?
Summary
Buffer overflow in the GetDriverSettings function in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a long realm field, a different vulnerability than CVE-2011-3173.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:01:51.258Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/viewContent.do?externalId=7010143"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the GetDriverSettings function in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a long realm field, a different vulnerability than CVE-2011-3173."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-02-20T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/viewContent.do?externalId=7010143"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-4187",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the GetDriverSettings function in nipplib.dll in Novell iPrint Client before 5.78 on Windows allows remote attackers to execute arbitrary code via a long realm field, a different vulnerability than CVE-2011-3173."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.novell.com/support/viewContent.do?externalId=7010143",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/viewContent.do?externalId=7010143"
            },
            {
              "name": "http://www.novell.com/support/viewContent.do?externalId=7008708",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/viewContent.do?externalId=7008708"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-4187",
    "datePublished": "2012-02-20T21:00:00Z",
    "dateReserved": "2011-10-25T00:00:00Z",
    "dateUpdated": "2024-09-16T18:08:04.183Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1708 (GCVE-0-2011-1708)

Vulnerability from nvd – Published: 2011-06-09 21:00 – Updated: 2024-08-06 22:37
VLAI?
Summary
Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs cookie.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:37:25.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1025606",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025606"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://zerodayinitiative.com/advisories/ZDI-11-180/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
          },
          {
            "name": "novell-iprint-opprinterlistalljobs-cookie-bo(67882)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67882"
          },
          {
            "name": "44811",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44811"
          },
          {
            "name": "48124",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48124"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731"
          },
          {
            "name": "20110606 ZDI-11-180: Novell iPrint op-printer-list-all-jobs cookie Remote Code Execution Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/518274/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-06-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs cookie."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1025606",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025606"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://zerodayinitiative.com/advisories/ZDI-11-180/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
        },
        {
          "name": "novell-iprint-opprinterlistalljobs-cookie-bo(67882)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67882"
        },
        {
          "name": "44811",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44811"
        },
        {
          "name": "48124",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48124"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731"
        },
        {
          "name": "20110606 ZDI-11-180: Novell iPrint op-printer-list-all-jobs cookie Remote Code Execution Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/518274/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted op-printer-list-all-jobs cookie."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1025606",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025606"
            },
            {
              "name": "http://zerodayinitiative.com/advisories/ZDI-11-180/",
              "refsource": "MISC",
              "url": "http://zerodayinitiative.com/advisories/ZDI-11-180/"
            },
            {
              "name": "http://download.novell.com/Download?buildid=6_bNby38ERg~",
              "refsource": "CONFIRM",
              "url": "http://download.novell.com/Download?buildid=6_bNby38ERg~"
            },
            {
              "name": "novell-iprint-opprinterlistalljobs-cookie-bo(67882)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67882"
            },
            {
              "name": "44811",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44811"
            },
            {
              "name": "48124",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/48124"
            },
            {
              "name": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731",
              "refsource": "CONFIRM",
              "url": "http://www.novell.com/support/php/search.do?cmd=displayKC\u0026docType=kc\u0026externalId=7008731"
            },
            {
              "name": "20110606 ZDI-11-180: Novell iPrint op-printer-list-all-jobs cookie Remote Code Execution Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/518274/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1708",
    "datePublished": "2011-06-09T21:00:00",
    "dateReserved": "2011-04-15T00:00:00",
    "dateUpdated": "2024-08-06T22:37:25.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}