Description
Stack-based buffer overflow in ienipp.ocx in Novell iPrint Client 5.30, and possibly other versions before 5.32, allows remote attackers to execute arbitrary code via a long target-frame parameter.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16523
metasploit
WORKING POC
GREAT
by jduck · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/novelliprint_target_frame.rb
References (6)
Scores
EPSS
0.6101
EPSS Percentile
98.3%
Details
CWE
CWE-119
Status
published
Products (2)
novell/iprint_client
5.30
novell/iprint_client
5.31
Published
Dec 08, 2009
Tracked Since
Feb 18, 2026