---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Novell iPrint Client ActiveX Control Multiple Vulnerabilities SECUNIA ADVISORY ID: SA30667 VERIFY ADVISORY: http://secunia.com/advisories/30667/ CRITICAL: Highly critical IMPACT: Exposure of sensitive information, System access WHERE: >From remote SOFTWARE: Novell iPrint Client 4.x http://secunia.com/product/14992/ Novell iPrint Client for Windows Vista 5.x http://secunia.com/product/19621/ DESCRIPTION: Secunia Research has discovered multiple vulnerabilities in Novell iPrint Client, which can be exploited by malicious people to gain knowledge of potentially sensitive information or compromise a user's system. 1) A boundary error in the Novell iPrint ActiveX control (ienipp.ocx) when handling the "GetDriverFile()" method can be exploited to cause a stack-based buffer overflow by passing an overly long string as the third argument. 2) Two boundary errors in the Novell iPrint ActiveX control (ienipp.ocx) when constructing URIs based on input to the "GetPrinterURLList()" and "GetPrinterURLList2()" methods can be exploited to cause limited stack-based buffer overflows via an overly long string passed as the 1st argument. 3) A boundary error in the Novell iPrint ActiveX control (ienipp.ocx) when handling the "GetFileList()" method can be exploited to cause a heap-based buffer overflow via an overly long argument. 4) Various boundary errors in nipplib.dll when e.g. creating a server reference or interpreting a URI can be exploited to cause stack-based and heap-based buffer overflows by e.g. passing an overly long string as argument to the "GetServerVersion()", "GetResourceList()", or "DeleteResource()" methods provided by the Novell iPrint ActiveX control (ienipp.ocx). 5) Boundary errors in the Novell iPrint ActiveX control (ienipp.ocx) when constructing URIs based on input to the "UploadPrinterDriver()" and "UploadResource()" methods can be exploited to cause a heap-based buffer overflow and limited stack-based buffer overflow via an overly long, specially crafted "uploadPath" argument. 6) A boundary error in the Novell iPrint ActiveX control (ienipp.ocx) when copying "target-frame" option values passed to the "ExecuteRequest()" method can be exploited to cause a limited stack-based buffer overflow via an overly long "target-frame" option value. 7) The insecure "GetFileList()" method returns a list of images (".jpg", ".jpeg", ".gif", and ".bmp") in a directory specified as argument to the method, which can be exploited to gain knowledge of any image file names in arbitrary directories on a user's system. This includes e.g. the user's "My Pictures" folder without knowledge of the user's username. 8) A boundary error in the Novell iPrint ActiveX control (ienipp.ocx) when handling the "UploadResource()" method can be exploited to cause a stack-based buffer overflow by passing an overly long string as the 7th argument. 9) Three boundary errors in nipplib.dll within the "IppGetDriverSettings()" function can be exploited to cause stack-based buffer overflows by passing an overly long string as the 2nd, 3rd, or 4th argument of the "GetDriverSettings()" method provided by Novell iPrint ActiveX control (ienipp.ocx). 10) A boundary error in the Novell iPrint ActiveX control (ienipp.ocx) when handling the "UploadResourceToRMS" method can be exploited to cause a stack-based buffer overflow by passing an overly long string as the 8th argument. The vulnerabilities have been confirmed in versions 4.36 and 5.04. Other versions may also be affected. SOLUTION: Update to version 5.06, which seems to address all vulnerabilities except #6. http://download.novell.com/Download?buildid=_BILqzyqc2g~ A fix for version 4.x is not currently available. PROVIDED AND/OR DISCOVERED BY: Carsten Eiram, Secunia Research. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2008-27/ http://secunia.com/secunia_research/2008-30/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------