Novell iPrint Client ActiveX Control Buffer Overflow Vulnerability

Summary
This host has Novell iPrint Client installed and is prone to Buffer Overflow vulnerability.
Impact
Successful exploits allow remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. Impact Level: System/Application
Solution
Upgrade to Novell iPrint Client version 5.40 or later, For updates refer to http://download.novell.com/index.jsp
Insight
The flaw is due to an unspecified buffer-overflow errors, because the application fails to perform boundary checks on user-supplied data.
Affected
Novell iPrint Client version 4.38 and prior on Windows.
References

Updated on 2017-03-28