Novell iPrint Client Multiple Vulnerabilities (windows)

Summary
The host is installed with Novell iPrint Client and is prone to multiple vulnerabilities.
Impact
Successful exploitation could allow attackers to execute arbitrary code, to cause buffer overflow or cause the application to crash. Impact Level: Application
Solution
Upgrade to Novell iPrint Client version 5.44 or later http://www.novell.com/products/openenterpriseserver/iprint.html
Insight
Multiple flaws are due to: - An error in 'PluginGetDriverFile' function, which interprets an uninitialized memory location as a pointer value. - An improper bounds checking by the 'call-back-url' parameter for a 'op-client-interface-version' operation. A remote attacker can use an overly long call-back-url parameter to overflow a buffer and execute arbitrary code on the system.
Affected
Novell iPrint Client version prior to 5.44 on Windows
References