copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2011.0008.2 - UPDATE [Win] Novell iPrint Client prior to 5.56: Execute arbitrary code/commands - Remote/unauthenticated

Date: 05 January 2011
Related Files: ESB-2011.0008  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2011.0008.2
         Novell iPrint Client Remote Code Execution Vulnerability
                              5 January 2011

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Novell iPrint Client prior to 5.56
Publisher:         Zero Day Initiative
Operating System:  Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2010-4321  

Original Bulletin: 
   http://www.zerodayinitiative.com/advisories/ZDI-10-295/
   http://www.zerodayinitiative.com/advisories/ZDI-10-296/
   http://www.zerodayinitiative.com/advisories/ZDI-10-297/
   http://www.zerodayinitiative.com/advisories/ZDI-10-298/
   http://www.zerodayinitiative.com/advisories/ZDI-10-299/
   http://www.zerodayinitiative.com/advisories/ZDI-10-300/

Comment: This bulletin contains six (6) Zero Day Initiative security 
         advisories.

Revision History:  January 5 2011: Added CVE
                   January 5 2011: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

Novell iPrint Client Netscape/ActiveX printer-state-reasons Remote Code
Execution Vulnerability

   ZDI-10-295: December 26th, 2010

CVSS Score

   9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)

Affected Vendors

   Novell

Affected Products

   iPrint

TippingPoint(TM) IPS Customer Protection

   TippingPoint IPS customers are protected against this vulnerability by
   Digital Vaccine protection filter ID 10758. For further product
   information on the TippingPoint IPS:
   http://www.tippingpoint.com

Vulnerability Details

   This vulnerability allows remote attackers to execute arbitrary code
   on vulnerable installations of Novell iPrint Client. User interaction
   is required to exploit this vulnerability in that the target must
   visit a malicious page or open a malicious file.

   The flaw exists within the both the Netscape (Firefox) and ActiveX
   (Internet Explorer) plugin components npnipp.dll and ienipp.ocx which
   are installed by default with the iPrint client. When handling the
   printer-state-reasons operation provided via the embed tag the module
   makes a request to the specified printer-url and performs insufficient
   validation of the size of the printer-state-reasons status response.
   The process then copies this user supplied data into a fixed-length
   buffer on the stack. A remote attacker can exploit this vulnerability
   to execute arbitrary code under the context of the browser.

Vendor Response

   Novell states:

   The fix for this security vulnerability is included in the released
   "iPrint Client for Windows XP/Vista/Win 7 5.56" patch, available at
   http://download.novell.com/Download?buildid=JV7fd0tFHHM~.

Disclosure Timeline

   2010-12-06 - Vulnerability reported to vendor
       2010-12-26 - Coordinated public release of advisory

Credit

   This vulnerability was discovered by:
   Ivan Rodriguez Almuina



Novell iPrint Client Netscape/ActiveX IPP Parameter Remote Code Execution
Vulnerability

   ZDI-10-296: December 26th, 2010

CVSS Score

   9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)

Affected Vendors

   Novell

Affected Products

   iPrint

TippingPoint(TM) IPS Customer Protection

   TippingPoint IPS customers are protected against this vulnerability by
   Digital Vaccine protection filter ID 10749. For further product
   information on the TippingPoint IPS:
   http://www.tippingpoint.com

Vulnerability Details

   This vulnerability allows remote attackers to execute arbitrary code
   on vulnerable installations of Novell iPrint Client. User interaction
   is required to exploit this vulnerability in that the target must
   visit a malicious page or open a malicious file.

   The flaw exists within the nipplib.dll component which is used by both
   the Mozilla and IE browser plugins for iPrint Client. When handling an
   IPP response from a user provided printer-url the process does not
   properly validate the size of the destination buffer and copies user
   supplied data of an arbitrary length into a fixed length buffer on the
   heap. A remote attacker can exploit this vulnerability to execute
   arbitrary code under the context of the browser.

Vendor Response

   Novell states:

   The fix for this security vulnerability is included in the released
   "iPrint Client for Windows XP/Vista/Win 7 5.56" patch, available at
   http://download.novell.com/Download?buildid=JV7fd0tFHHM~.

Disclosure Timeline

   2010-11-30 - Vulnerability reported to vendor
       2010-12-26 - Coordinated public release of advisory

Credit

   This vulnerability was discovered by:
   Ivan Rodriguez Almuina



Novell iPrint Client Netscape/ActiveX Location Header Remote Code Execution
Vulnerability

   ZDI-10-297: December 26th, 2010

CVSS Score

   9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)

Affected Vendors

   Novell

Affected Products

   iPrint

TippingPoint(TM) IPS Customer Protection

   TippingPoint IPS customers are protected against this vulnerability by
   Digital Vaccine protection filter ID 10749. For further product
   information on the TippingPoint IPS:
   http://www.tippingpoint.com

Vulnerability Details

   This vulnerability allows remote attackers to execute arbitrary code
   on vulnerable installations of Novell iPrint Client. Authentication is
   not required to exploit this vulnerability.

   The flaw exists within the nipplib.dll component which is used by both
   the Mozilla and IE browser plugins for iPrint Client. When handling an
   HTTP 301 response from a user provided printer-url the process
   attempts to copy the returned value within the Location HTTP header
   without ensuring that the destination buffer is adequately sized. A
   remote attacker can exploit this vulnerability to execute arbitrary
   code under the context of the browser.

Vendor Response

   Novell states:

   The fix for this security vulnerability is included in the released
   "iPrint Client for Windows XP/Vista/Win 7 5.56" patch, available at
   http://download.novell.com/Download?buildid=JV7fd0tFHHM~.

Disclosure Timeline

   2010-11-30 - Vulnerability reported to vendor
       2010-12-26 - Coordinated public release of advisory

Credit

   This vulnerability was discovered by:
   Ivan Rodriguez Almuina



Novell iPrint Client Netscape Plugin call-back-url Parameter Remote Code
Execution Vulnerability

   ZDI-10-298: December 26th, 2010

CVSS Score

   9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)

Affected Vendors

   Novell

Affected Products

   iPrint

TippingPoint(TM) IPS Customer Protection

   TippingPoint IPS customers are protected against this vulnerability by
   Digital Vaccine protection filter ID 10749. For further product
   information on the TippingPoint IPS:
   http://www.tippingpoint.com

Vulnerability Details

   This vulnerability allows remote attackers to execute arbitrary code
   on vulnerable installations of Novell iPrint Client. Authentication is
   not required to exploit this vulnerability.

   The flaw exists within the npnipp.dll Mozilla browser plugin for
   iPrint client. When assembling a URL using the user supplied
   call-back-url, the value is passed into a urlencode function where it
   is copied into a fixed-length buffer on the stack. A remote attacker
   can exploit this vulnerability to execute arbitrary code under the
   context of the browser.

Vendor Response

   Novell states:

   The fix for this security vulnerability is included in the released
   "iPrint Client for Windows XP/Vista/Win 7 5.56" patch, available at
   http://download.novell.com/Download?buildid=JV7fd0tFHHM~.

Disclosure Timeline

   2010-11-30 - Vulnerability reported to vendor
       2010-12-26 - Coordinated public release of advisory

Credit

   This vulnerability was discovered by:
   Ivan Rodriguez Almuina



Novell iPrint Client Netscape/ActiveX Plugin Wide Character IPP Remote Code
Execution Vulnerability

   ZDI-10-299: December 26th, 2010

CVSS Score

   9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)

Affected Vendors

   Novell

Affected Products

   iPrint

TippingPoint(TM) IPS Customer Protection

   TippingPoint IPS customers are protected against this vulnerability by
   Digital Vaccine protection filter ID 10749. For further product
   information on the TippingPoint IPS:
   http://www.tippingpoint.com

Vulnerability Details

   This vulnerability allows remote attackers to execute arbitrary code
   on vulnerable installations of Novell iPrint Client. Authentication is
   not required to exploit this vulnerability.

   The flaw exists within the nipplib.dll component which is used by both
   the Mozilla and IE browser plugins for iPrint Client. When handling an
   IPP response from a user provided printer-url the process does not
   properly validate the size of the destination buffer and copies user
   supplied data of an arbitrary length into a fixed length buffer on the
   stack. A remote attacker can exploit this vulnerability to execute
   arbitrary code under the context of the browser.

Vendor Response

   Novell states:

   The fix for this security vulnerability is included in the released
   "iPrint Client for Windows XP/Vista/Win 7 5.56" patch, available at
   http://download.novell.com/Download?buildid=JV7fd0tFHHM~.

Disclosure Timeline

   2010-11-30 - Vulnerability reported to vendor
       2010-12-26 - Coordinated public release of advisory

Credit

   This vulnerability was discovered by:
   Ivan Rodriguez Almuina



Novell iPrint Client Netscape/ActiveX Plugin HTTP_CONNECTION Remote Code
Execution Vulnerability

   ZDI-10-300: December 26th, 2010

CVSS Score

   9, (AV:N/AC:L/Au:N/C:P/I:P/A:C)

Affected Vendors

   Novell

Affected Products

   iPrint

TippingPoint(TM) IPS Customer Protection

   TippingPoint IPS customers are protected against this vulnerability by
   Digital Vaccine protection filter ID 10749. For further product
   information on the TippingPoint IPS:
   http://www.tippingpoint.com

Vulnerability Details

   This vulnerability allows remote attackers to execute arbitrary code
   on vulnerable installations of Novell iPrint Client. Authentication is
   not required to exploit this vulnerability.

   The flaw exists within the nipplib.dll component used by the the
   Mozilla and Internet Explorer browser plugins for iPrint client. When
   parsing an HTTP response the Connection response length is in
   sufficiently validated before being copied into a fixed-length buffer
   on the stack. A remote attacker can exploit this vulnerability to
   execute arbitrary code under the context of the browser.

Vendor Response

   Novell states:

   The fix for this security vulnerability is included in the released
   "iPrint Client for Windows XP/Vista/Win 7 5.56" patch, available at
   http://download.novell.com/Download?buildid=JV7fd0tFHHM~.

Disclosure Timeline

   2010-11-29 - Vulnerability reported to vendor
       2010-12-26 - Coordinated public release of advisory

Credit

   This vulnerability was discovered by:
   Ivan Rodriguez Almuina

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFNI8kX/iFOrG6YcBERAoUVAJ0WHnvqLJD4ohhoPDMO6ZQU794y6ACdEuiW
+FidI5i0bzhPvvsftnOAx6I=
=GdWq
-----END PGP SIGNATURE-----