{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2009-12-08T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions before 5.32 allow remote attackers to execute arbitrary code via vectors related to (1) Date and (2) Time."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-10T18:57:01.000Z","orgId":"44d08088-2bea-4760-83a6-1e9be26b15ab","shortName":"flexera"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"http://download.novell.com/Download?buildid=29T3EFRky18~"},{"name":"20091208 Secunia Research: Novell iPrint Client Date/Time Parsing Buffer Overflow","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/508288/100/0/threaded"},{"name":"ADV-2009-3429","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2009/3429"},{"name":"37242","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/37242"},{"name":"35004","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/35004"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2009-44/"},{"name":"37169","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/37169"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"PSIRT-CNA@flexerasoftware.com","ID":"CVE-2009-1569","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple stack-based buffer overflows in Novell iPrint Client 4.38, 5.30, and possibly other versions before 5.32 allow remote attackers to execute arbitrary code via vectors related to (1) Date and (2) Time."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://download.novell.com/Download?buildid=29T3EFRky18~","refsource":"CONFIRM","url":"http://download.novell.com/Download?buildid=29T3EFRky18~"},{"name":"20091208 Secunia Research: Novell iPrint Client Date/Time Parsing Buffer Overflow","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/508288/100/0/threaded"},{"name":"ADV-2009-3429","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2009/3429"},{"name":"37242","refsource":"BID","url":"http://www.securityfocus.com/bid/37242"},{"name":"35004","refsource":"SECUNIA","url":"http://secunia.com/advisories/35004"},{"name":"http://secunia.com/secunia_research/2009-44/","refsource":"MISC","url":"http://secunia.com/secunia_research/2009-44/"},{"name":"37169","refsource":"SECUNIA","url":"http://secunia.com/advisories/37169"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T05:20:34.621Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://download.novell.com/Download?buildid=29T3EFRky18~"},{"name":"20091208 Secunia Research: Novell iPrint Client Date/Time Parsing Buffer Overflow","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/508288/100/0/threaded"},{"name":"ADV-2009-3429","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2009/3429"},{"name":"37242","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/37242"},{"name":"35004","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/35004"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2009-44/"},{"name":"37169","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/37169"}]}]},"cveMetadata":{"assignerOrgId":"44d08088-2bea-4760-83a6-1e9be26b15ab","assignerShortName":"flexera","cveId":"CVE-2009-1569","datePublished":"2009-12-08T23:00:00.000Z","dateReserved":"2009-05-06T00:00:00.000Z","dateUpdated":"2024-08-07T05:20:34.621Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}