/// File Name: |
novelliprint_target_frame.rb.txt |
Description:
|
This Metasploit module exploits a stack overflow in Novell iPrint Client 5.30. When passing an overly long string via the "target-frame" parameter to ienipp.ocx an attacker can execute arbitrary code. NOTE: The "operation" variable must be set to a valid command in order to reach this vulnerability.
|
Author: | jduck |
Homepage: | http://www.metasploit.com |
File Size: | 3666 |
Related OSVDB(s): | 60803 |
Related CVE(s): | CVE-2009-1568 |
Last Modified: | Feb 23 19:30:09 2010 |
MD5 Checksum: | 3c93b9922ed66b323be31f7349ec51d0 |