ZDI-10-139: Novell iPrint Client Browser Plugin Parameter Name Remote Code Execution
http://www.zerodayinitiative.com/advisories/ZDI-10-139
August 5, 2010
-- CVSS:
10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)
-- Affected Vendors:
Novell
-- Affected Products:
Novell iPrint
-- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 9882.
For further product information on the TippingPoint IPS, visit:
http://www.tippingpoint.com
-- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of the Novell iPrint Client browser plugin.
User interaction is required in that a target must visit a malicious web
page.
The specific flaw exists within handling plugin parameters. The
application does not properly verify the name of parameters passed via