Language:
http://dvlabs.tippingpoint.com/advisory/TPTI-10-05
http://dvlabs.tippingpoint.com/advisory/TPTI-10-06
https://www.zerodayinitiative.com/advisories/ZDI-10-139/
https://www.zerodayinitiative.com/advisories/ZDI-10-140/
https://seclists.org/fulldisclosure/2010/Aug/65
https://seclists.org/fulldisclosure/2010/Aug/66
https://seclists.org/fulldisclosure/2010/Aug/69
Severity: High
ID: 48364
File Name: novell_iprint_542.nasl
Version: 1.17
Type: local
Agent: windows
Family: Windows
Published: 8/18/2010
Updated: 11/15/2018
Supported Sensors: Nessus Agent, Nessus
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 9.3
Temporal Score: 7.7
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: cpe:/a:novell:iprint
Required KB Items: SMB/Registry/Enumerated
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/23/2010
Vulnerability Publication Date: 7/23/2010
Core Impact
Metasploit (Novell iPrint Client ActiveX Control ExecuteRequest debug Buffer Overflow)
CVE: CVE-2010-3106, CVE-2010-3107, CVE-2010-3108, CVE-2010-3109
BID: 42100
Secunia: 40782