Novell iPrint nipplib.dll client-file-name Remote Code Execution VulnerabilityZDI-11-178: June 6th, 2011
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 11195. For further product information on the TippingPoint IPS:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell iPrint Client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The flaw exists within the nipplib component which is used by both the ActiveX and Netscape compatible browser plugins. When handling the client-file-name parameter from the user specified printer-url the process blindly copies user supplied data into a fixed-length buffer on the heap. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the browser.
Vendor ResponseNovell states:
The fix has been documented as
TID 7008729: Security Vulnerability - Novell iPrint nipplib.dll client-file-name Remote Code Execution Vulnerability
2011-04-01 - Vulnerability reported to vendor
2011-06-06 - Coordinated public release of advisory
CreditThis vulnerability was discovered by:
Ivan Rodriguez Almuina