Welcome 微信登录
编程资源 图片资源库 蚂蚁家优选 PDF转换器

首页 / 操作系统 / Linux / Novell iPrint Client GetPrinterURLList2方法远程代码执行漏洞

发布日期:2012-02-08
更新日期:2012-06-28受影响系统:
Novell iPrint Client for Windows 5.77
Novell iPrint Client for Windows 5.76
Novell iPrint Client for Windows 5.75
Novell iPrint Client for Windows 5.74
Novell iPrint Client for Windows 5.73
Novell iPrint Client for Windows 5.72
Novell iPrint Client for Windows 5.64
Novell iPrint Client for Windows 5.56
Novell iPrint Client for Windows 5.52
Novell iPrint Client for Windows 5.44
Novell iPrint Client for Windows 5.32
Novell iPrint Client for Windows 5.30
Novell iPrint Client for Windows 5.08
Novell iPrint Client for Windows 5.06
Novell iPrint Client for Windows 5.04
Novell iPrint Client for Windows 4.38
Novell iPrint Client for Windows 4.36
Novell iPrint Client for Windows 4.34
不受影响系统:
Novell iPrint Client for Windows 5.78
描述:
--------------------------------------------------------------------------------
BUGTRAQ  ID: 51926
CVE(CAN) ID: CVE-2011-4185Novell iPrint是打印解决方案。Windows平台上Novell iPrint Client 5.78之前版本ActiveX控件中GetPrinterURLList2方法在实现上存在远程代码执行漏洞,可导致远程执行任意代码或造成拒绝服务(内存破坏)。<*来源:gwslabs.com
  *>建议:
--------------------------------------------------------------------------------
厂商补丁:Novell
------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:http://support.novell.com/security-alertsSAP Netweaver ABAP "msg_server.exe"远程代码执行漏洞Novell iPrint Client GetDriverSettings缓冲区溢出漏洞相关资讯      远程代码执行漏洞 
  • Microsoft Windows OLE远程代码执  (11/14/2014 12:13:56)
  • Novell ZENWorks AdminStudio   (03/26/2013 18:45:20)
  • Novell Groupwise Client ActiveX  (02/02/2013 07:25:44)
  • HP System Management Homepage "  (04/03/2013 13:59:17)
  • Oracle Hyperion Financial   (03/14/2013 15:00:59)
  • Novell Groupwise Client多个不明  (02/02/2013 07:22:58)
本文评论 查看全部评论 (0)
表情: 姓名: 字数


评论声明
  • 尊重网上道德,遵守中华人民共和国的各项有关法律法规
  • 承担一切因您的行为而直接或间接导致的民事或刑事法律责任