This Metasploit module exploits a stack buffer overflow in Novell iPrint Client 5.52. When sending an overly long string to the GetDriverSettings() property of ienipp.ocx an attacker may be able to execute arbitrary code.
dd50e06da2f228591a1f360cb7873d100656fb1bfc9fe7d53e51fd9983a3f046
Novell iPrint versions 5.52 and below active-x GetDriverSettings() remote exploit.
86f276924df3584972409a858e2eacedb5fba702c6c79a2304107e139e7b9084