![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.900729 |
Categoría: | Buffer overflow |
Título: | Novell iPrint Client Multiple BOF Vulnerabilities - Windows |
Resumen: | Novell iPrint Client is prone to multiple Buffer Overflow vulnerabilities. |
Descripción: | Summary: Novell iPrint Client is prone to multiple Buffer Overflow vulnerabilities. Vulnerability Insight: Multiple flaws are due to inadequate boundary checks on user supplied inputs while the application processes the input data into the application context. Vulnerability Impact: Successful exploitation lets the remote attacker have a control over the remote system registers allowing execution of malformed shellcode. Affected Software/OS: Novell iPrint Client version prior to 5.32. Solution: Upgrade Novell iPrint Client version to 5.32. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-1569 BugTraq ID: 37242 http://www.securityfocus.com/bid/37242 Bugtraq: 20091208 Secunia Research: Novell iPrint Client Date/Time Parsing Buffer Overflow (Google Search) http://www.securityfocus.com/archive/1/508288/100/0/threaded http://secunia.com/secunia_research/2009-44/ http://secunia.com/advisories/35004 http://secunia.com/advisories/37169 http://www.vupen.com/english/advisories/2009/3429 Common Vulnerability Exposure (CVE) ID: CVE-2009-1568 Bugtraq: 20091208 Secunia Research: Novell iPrint Client "target-frame" Parameter Buffer Overflow (Google Search) http://www.securityfocus.com/archive/1/508289/100/0/threaded http://secunia.com/secunia_research/2009-40/ |
Copyright | Copyright (C) 2009 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |