Language:
https://www.zerodayinitiative.com/advisories/ZDI-10-256/
https://www.zerodayinitiative.com/advisories/ZDI-10-295/
https://www.zerodayinitiative.com/advisories/ZDI-10-296/
https://www.zerodayinitiative.com/advisories/ZDI-10-297/
https://www.zerodayinitiative.com/advisories/ZDI-10-298/
https://www.zerodayinitiative.com/advisories/ZDI-10-299/
https://www.zerodayinitiative.com/advisories/ZDI-10-300/
https://seclists.org/fulldisclosure/2010/Nov/213
https://seclists.org/fulldisclosure/2010/Dec/642
https://seclists.org/fulldisclosure/2010/Dec/643
https://seclists.org/fulldisclosure/2010/Dec/644
https://seclists.org/fulldisclosure/2010/Dec/645
https://seclists.org/fulldisclosure/2010/Dec/646
Severity: High
ID: 51367
File Name: novell_iprint_556.nasl
Version: 1.14
Type: local
Agent: windows
Family: Windows
Published: 12/29/2010
Updated: 11/15/2018
Supported Sensors: Nessus Agent, Nessus
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 9.3
Temporal Score: 7.7
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: cpe:/a:novell:iprint
Required KB Items: SMB/Novell/iPrint/Version
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 12/22/2010
Vulnerability Publication Date: 11/18/2010
Core Impact
Metasploit (Novell iPrint Client ActiveX Control Buffer Overflow)
CVE: CVE-2010-4321