Novell iPrint Client ActiveX Control Debug Buffer Overflow Exploit

The specific flaw exists within the ienipp.ocx ActiveX control. The control accepts a 'debug' parameter that is expected to be either "yes" or "true". If a string of a specific length is provided instead, a processing loop within the ExecuteRequest method can be made to corrupt a stack-based buffer.
Exploit Type - Old
Exploits/Client Side
Exploit Platform
Exploit Type
Product Name