[NT] Novell iPrint Client nipplib.dll "IppCreateServerRef()" Buffer Overflow



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



Novell iPrint Client nipplib.dll "IppCreateServerRef()" Buffer Overflow
------------------------------------------------------------------------


SUMMARY

"Neither you nor your users have time to devote to a complex printing
environment. That's why Novell iPrint extends print services securely
across multiple networks and operating systems. Using proven Internet
technologies, iPrint transforms your Novell Distributed Print Services
(NDPS) printers into Net-enabled printers, making all your printing
resources instantly accessible with a Web browser and a few mouse clicks".
Secunia Research has discovered a vulnerability in Novell iPrint Client,
which can be exploited by malicious people to compromise a user's system.

DETAILS

Vulnerable Systems:
* Novell iPrint Client version 4.36
* Novell iPrint Client for Vista version 5.04
* Novell iPrint Client for Vista version 5.06

Immune Systems:
* Novell iPrint Client version 4.38
* Novell iPrint Client for Vista version 5.08

The vulnerability is caused due to a boundary error within the
"IppCreateServerRef()" function in nipplib.dll. This can be exploited to
cause a heap-based buffer overflow by passing an overly long, specially
crafted string as argument to either "GetPrinterURLList()",
"GetPrinterURLList2()", or "GetFileList2()" as provided by the Novell
iPrint ActiveX control (ienipp.ocx).

Successful exploitation may allow execution of arbitrary code.

Time Table:
25/08/2008 - Vendor notified.
26/08/2008 - Vendor response.
03/09/2008 - Public disclosure.

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2436>
CVE-2008-2436


ADDITIONAL INFORMATION

The information has been provided by Secunia Research.
The original article can be found at:
<http://secunia.com/secunia_research/2008-33/>
http://secunia.com/secunia_research/2008-33/



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.