Channel Daily News

Novell’s iPrint open to attack, say researchers

Attackers can exploit bugs in Novell Inc.’s iPrint application to obtain corporate information or hijack computers, security experts said Monday.

Novell has issued a patch that plugs multiple holes in the ActiveX control that Novell ships as part of its iPrint product, but according to Copenhagen-based bug tracker Secunia APS, one of the flaws remains unfixed.

Secunia, which reported the bugs to Novell, counted at least eight vulnerabilities in the ActiveX control included with the Windows Vista version of the iPrint client, as well as several other flaws in another Windows Vista iPrint component.

IPrint is Novell’s implementation of the Internet Printing Protocol (IPP) and lets users use, install and manage printers through the browser. The Vista version of the application ships with Novell’s Open Enterprise Server 2 and NetWare 6.5 Support Pack 7.

Novell posted an update to iPrint last week that patches all but one of the vulnerabilities, said Secunia in an alert it published today. The update takes iPrint to Version 5.06. A fix for the older 4.x edition of iPrint, however, is not yet available.

For its part, Novell’s accompanying advisory specified only one of the many vulnerabilities listed by Secunia and lumped the rest under a heading of “Security fixes: Multiple Buffer Overflow Security Vulnerabilities.”

This is not the first time that Novell has had to quash bugs in iPrint’s ActiveX control. Just two months ago, a researcher at the U.S. Computer Emergency Readiness Team (US-CERT) uncovered several vulnerabilities in the control packaged with iPrint for Windows 2000 and Windows XP. Novell patched those bugs with the iPrint 4.36 update in June.

ActiveX vulnerabilities are commonplace. Earlier this year, in fact, Symantec Corp. reported that the Microsoft Corp. technology accounted for 79 per cent of all browser plug-in bugs in the second half of 2007.

Exit mobile version