Novell iPrint Client ActiveX Control Debug Buffer Overflow Exploit

The specific flaw exists within the ienipp.ocx ActiveX control. The control accepts a 'debug' parameter that is expected to be either "yes" or "true". If a string of a specific length is provided instead, a processing loop within the ExecuteRequest method can be made to corrupt a stack-based buffer.
Exploit type: 
Vulnerabilty ID: 
Released Date: 
Thursday, September 23, 2010 - 19:00