cpe:/a:novell:iprint:4.26 cpe:/a:novell:iprint:4.27 cpe:/a:novell:iprint:4.28 cpe:/a:novell:iprint:4.30 cpe:/a:novell:iprint:4.32 cpe:/a:novell:iprint:4.34 cpe:/a:novell:iprint:4.36 cpe:/a:novell:iprint:4.38 cpe:/a:novell:iprint:5.04 cpe:/a:novell:iprint:5.12 cpe:/a:novell:iprint:5.20b cpe:/a:novell:iprint:5.30 cpe:/a:novell:iprint:5.32 cpe:/a:novell:iprint:5.40 cpe:/a:novell:iprint:5.42 cpe:/a:novell:iprint:5.44 cpe:/a:novell:iprint:5.50 cpe:/a:novell:iprint:5.52 cpe:/a:novell:iprint:5.56 cpe:/a:novell:iprint:5.60 CVE-2011-1699 2011-06-09T15:55:01.367-04:00 2011-09-06T23:16:23.723-04:00 9.3 NETWORK MEDIUM NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2011-06-10T08:22:00.000-04:00 SECTRACK 1025606 BUGTRAQ 20110606 ZDI-11-172: Novell iPrint nipplib.dll uri Remote Code Execution Vulnerability SECUNIA 44811 BID 48124 CONFIRM http://download.novell.com/Download?buildid=6_bNby38ERg~ CONFIRM http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008720 MISC http://zerodayinitiative.com/advisories/ZDI-11-172/ Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted uri parameter in a printer-url.