Secunia Research has discovered a vulnerability in Novell iPrint Client, which can be exploited by malicious people to compromise a user’s system. The vulnerability is caused by a boundary error in the parsing of certain time information and can be exploited to cause a stack-based buffer overflow via overly long strings passed to certain parameters and methods. Successful exploitation allows execution of arbitrary code when a user e.g. views a malicious web page.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/83559/secunia-nicdt.txt
Source: https://packetstormsecurity.com/files/83559/Novell-iPrint-Client-Date-Time-Parsing-Buffer-Overflow.html

