CVE ID | CVE-2010-4314 |
CVSS SCORE | 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C |
AFFECTED VENDORS |
Novell |
AFFECTED PRODUCTS |
iPrint |
TREND MICRO CUSTOMER PROTECTION | Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['9882']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com |
VULNERABILITY DETAILS |
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of the Novell iPrint Client browser plugin. User interaction is required in that a target must visit a malicious web page. The specific flaw exists within handling plugin parameters. The application does not properly verify the name of parameters passed via <embed> tags. If a malicious attacker provides a long enough value a destination buffer can be overflowed. Successful exploitation leads to execution of arbitrary code under the context of the user owning the browser process. |
ADDITIONAL DETAILS |
Novell has issued an update to correct this vulnerability. More details can be found at:
http://download.novell.com/Download?buildid=ftwZBxEFjIg~ |
DISCLOSURE TIMELINE |
|
CREDIT | Ivan Almuina |