CVE-2010-4321
Novell Iprint Client - Memory Corruption
Title source: ruleDescription
Stack-based buffer overflow in an ActiveX control in ienipp.ocx in Novell iPrint Client 5.52 allows remote attackers to execute arbitrary code via a long argument to (1) the GetDriverSettings2 method, as reachable by (2) the GetDriverSettings method.
Exploits (3)
metasploit
WORKING POC
NORMAL
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/novelliprint_getdriversettings_2.rb
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16956
exploitdb
WORKING POC
VERIFIED
by Dr_IDE · htmlremotewindows
https://www.exploit-db.com/exploits/16014
References (5)
Scores
EPSS
0.5660
EPSS Percentile
98.1%
Classification
CWE
CWE-119
Status
draft
Affected Products (1)
novell/iprint_client
Timeline
Published
Dec 30, 2010
Tracked Since
Feb 18, 2026