TippingPoint Zero Day Initiative

Novell iPrint nipplib.dll client-file-name Remote Code Execution Vulnerability

ZDI-11-178: June 6th, 2011


CVSS Score

Affected Vendors

Affected Products

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 11195. For further product information on the TippingPoint IPS:

Vulnerability Details

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The flaw exists within the nipplib component which is used by both the ActiveX and Netscape compatible browser plugins. When handling the client-file-name parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buffer on the heap. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the browser.

Vendor Response

Novell states:

The fix has been documented as
TID 7008729: Security Vulnerability - Novell iPrint nipplib.dll client-file-name Remote Code Execution Vulnerability

Disclosure Timeline

    2011-04-01 - Vulnerability reported to vendor
    2011-06-06 - Coordinated public release of advisory


This vulnerability was discovered by:
    Ivan Rodriguez Almuina