Novell iPrint ExecuteRequest() Exploit

This module exploits a vulnerability in the ienipp.ocx control included in Novell iPrint Client v4.32 and prior. The exploit is triggered when the ExecuteRequest() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
Exploit type: 
Vulnerabilty ID: 
Released Date: 
Thursday, February 28, 2008 - 18:00