Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200409-24] Foomatic: Arbitrary command execution in foomatic-rip filter


Vulnerability Assessment Details

[GLSA-200409-24] Foomatic: Arbitrary command execution in foomatic-rip filter

Vulnerability Assessment Summary
Foomatic: Arbitrary command execution in foomatic-rip filter

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200409-24
(Foomatic: Arbitrary command execution in foomatic-rip filter)


There is a vulnerability in the foomatic-filters package. This
vulnerability is due to insufficient checking of command-line parameters
and environment variables in the foomatic-rip filter.

Impact

This vulnerability may permit both local and remote attackers to execute
arbitrary commands on the print server with the permissions of the spooler
(oftentimes the "lp" user).

Workaround

There is no known workaround at this time.

References:
http://www.linuxprinting.org/pipermail/foomatic-devel/2004q3/001996.html
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0801


Solution:
All foomatic users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=net-print/foomatic-3.0.2"
# emerge ">=net-print/foomatic-3.0.2"
PLEASE NOTE: You should update foomatic, instead of foomatic-filters. This
will help to ensure that all other foomatic components remain functional.


Network Security Threat Level: High


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2005 Michel Arboi

Cables, Connectors

HP J3188A 10Base- T Hub- 16M | Cisco IOS 1516M | 16 Ethernet Ports | 100-240 V
$14.99
HP J3188A 10Base- T Hub- 16M | Cisco IOS 1516M | 16 Ethernet Ports | 100-240 V pictureCisco 3702i (AIR-CAP3702I-A-K9) LWAPP 802.11 AC Access Point-READ
$150.0
Cisco 3702i (AIR-CAP3702I-A-K9) LWAPP 802.11 AC Access Point-READ pictureCisco Aironet 1602E IEEE 802.11n 300 Mbps Wireless AP (AIR-CAP1602E-A-K9)
$199.99
Cisco Aironet 1602E IEEE 802.11n 300 Mbps Wireless AP  (AIR-CAP1602E-A-K9) pictureGenuine Cisco Catalyst 2950 48-Port Switch WS-C2950G-48-EI
$24.95
Genuine Cisco Catalyst 2950 48-Port Switch WS-C2950G-48-EI picture


Discussions

No Discussions have been posted on this vulnerability.