module
Novell iPrint Client ActiveX Control call-back-url Buffer Overflow
| Disclosed | Created |
|---|---|
| Aug 20, 2010 | May 30, 2018 |
Disclosed
Aug 20, 2010
Created
May 30, 2018
Description
This module exploits a stack-based buffer overflow in Novell iPrint Client 5.42.
When sending an overly long string to the 'call-back-url' parameter in an
op-client-interface-version action of ienipp.ocx an attacker may be able to
execute arbitrary code.
When sending an overly long string to the 'call-back-url' parameter in an
op-client-interface-version action of ienipp.ocx an attacker may be able to
execute arbitrary code.
Author
Trancer [email protected]
Platform
Windows
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.