Description
The ienipp.ocx ActiveX control in the browser plugin in Novell iPrint Client before 5.42 does not properly validate the debug parameter, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a parameter value with a crafted length, related to the ExecuteRequest method.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16492
exploitdb
WORKING POC
VERIFIED
by Trancer · rubyremotewindows
https://www.exploit-db.com/exploits/15073
metasploit
WORKING POC
NORMAL
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/novelliprint_executerequest_dbg.rb
Scores
EPSS
0.5577
EPSS Percentile
98.1%
Details
CWE
CWE-20
Status
published
Products (14)
novell/iprint
4.26
novell/iprint
4.27
novell/iprint
4.28
novell/iprint
4.30
novell/iprint
4.32
novell/iprint
4.34
novell/iprint
4.36
novell/iprint
4.38
novell/iprint
5.04
novell/iprint
5.12
... and 4 more
Published
Aug 23, 2010
Tracked Since
Feb 18, 2026