copyright
|
disclaimer
|
privacy
|
contact
HOME
About
AusCERT
Membership
Contact Us
PKI Services
Training
Publications
Sec. Bulletins
Conferences
News & Media
Services
Web Log
Site Map
Site Help
Member login
Login »
Become a member »
Home
»
Security Bul...
»
Security Bul...
»
AusCERT Exte...
» ESB-2013.0622 - [Win] Novell iPrint: Execute arbitra...
ESB-2013.0622 - [Win] Novell iPrint: Execute arbitrary code/commands - Remote/unauthenticated
Date:
03 May 2013
Click here for printable version
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2013.0622 Security Vulnerability - Novell iPrint Client Stack Buffer Overflow Remote Code Execution Vulnerability 3 May 2013 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Novell iPrint Publisher: Novell Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2013-1091 Original Bulletin: http://www.novell.com/support/kb/doc.php?id=7012344 - --------------------------BEGIN INCLUDED TEXT-------------------- Security Vulnerability - Novell iPrint Client Stack Buffer Overflow Remote Code Execution Vulnerability Document ID:7012344 Creation Date:01-MAY-13 Modified Date:01-MAY-13 NovelliPrint This document (7012344) is provided subject to the disclaimer at the end of this document. Environment Novell iPrint Client for Windows Situation Novell iPrint Client Stack Buffer Overflow Remote Code Execution Vulnerability. Resolution The fix for this security vulnerability is included in the released "iPrint Client for Windows XP/Vista/Win 7/Win 8 5.90" patch, available at http://download.novell.com/Download?buildid=k6yH0sy992E~ or later. Status Security Alert Additional Information ZDI-CAN-1715: Novell iPrint Client Stack Buffer Overflow Remote Code Execution Vulnerability. This vulnerability was found by Ivan Rodriguez Almuina, working with TippingPoint's Zero Day Initiative. CVE-2013-1091. Disclaimer This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBUYM1Eu4yVqjM2NGpAQJQTA/+KXIORrKECAb6Syw3Gvlp1BN7eAcJw2eH dXkmkXuawGMMFbpx6CGaIJut0CwBj/BiPmW7kSIIuz27hkHetndhBa2PVobVD4X9 BJUeLVk20j6fZJAFrmIbRiCcSIg7VzcnKZ9eMZwJ5Tl1vMVauA7LS8FZolYbaOMt nbGKaEsoiiAbuXw7q60b41VaVECgUnmOR9abQPd6PjByRKc7i9KkUeXCX5TmmNdY L2RZZjiqEZGCxyUCbSFO4XxDqblEuJcf8xh9J/jHemUdnsntjUH6xyWm2eD2FJGr bFTpVaVM0+1HSWz6ufaRoKnc5fEHAPhUgI3eEn3/WcW4HKkVrQdmL04kQCOqLsO9 d8J/Shdy4fdqsw/MCuEO1t3Yl2eAV3WjhcAdFuS+t8PBbL/86Ef22mg/sh2UepuA BId7bFQpwX9gz2OQR+XILvHQsjpozltdYms3WoZuc3/AJ4n4NFsJLCXGHIW5y2ty vstgvc+eIobqistI70dIjSTdcE84z9eJaZa+eXZNjR70x9gr7nAj2FSQwusSlI0F pgt/HKheDLt5Qr9NNo24s5eSo0IOSFEI/LLtTDRkLnFL/3+8rV5p+0lXJoXhjL3F 61dZ0vHi5b8fTvpxIqjspSSCGI3rqEhw4P6Oyme7oLPX9I3Ezjrmk6DgQ/Tv3dDM hSscYb4O2U0= =sIlT -----END PGP SIGNATURE-----
Comments? Click here
http://www.auscert.org.au/render.html?cid=1980&it=17480