cpe:/a:novell:iprint:4.26 cpe:/a:novell:iprint:4.27 cpe:/a:novell:iprint:4.28 cpe:/a:novell:iprint:4.30 cpe:/a:novell:iprint:4.32 cpe:/a:novell:iprint:4.34 cpe:/a:novell:iprint:4.36 cpe:/a:novell:iprint:4.38 cpe:/a:novell:iprint:5.04 cpe:/a:novell:iprint:5.12 cpe:/a:novell:iprint:5.20b cpe:/a:novell:iprint:5.30 cpe:/a:novell:iprint:5.32 cpe:/a:novell:iprint:5.40 cpe:/a:novell:iprint:5.42 cpe:/a:novell:iprint:5.44 cpe:/a:novell:iprint:5.50 cpe:/a:novell:iprint:5.52 cpe:/a:novell:iprint:5.56 cpe:/a:novell:iprint:5.60 CVE-2011-1703 2011-06-09T15:55:01.557-04:00 2017-08-16T21:34:20.197-04:00 9.3 NETWORK MEDIUM NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2011-06-10T09:03:00.000-04:00 SECTRACK 1025606 BUGTRAQ 20110606 ZDI-11-176: Novell iPrint nipplib.dll driver-version Remote Code Vulnerability SECUNIA 44811 BID 48124 CONFIRM http://download.novell.com/Download?buildid=6_bNby38ERg~ CONFIRM http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7008727 MISC http://zerodayinitiative.com/advisories/ZDI-11-176/ XF novell-iprint-driverversion-bo(67878) Heap-based buffer overflow in nipplib.dll in Novell iPrint Client before 5.64 allows remote attackers to execute arbitrary code via a crafted driver-version parameter in a printer-url.