Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Foomatic: Arbitrary command execution in foomatic-rip filter
Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200409-24
(Foomatic: Arbitrary command execution in foomatic-rip filter)
There is a vulnerability in the foomatic-filters package. This
vulnerability is due to insufficient checking of command-line parameters
and environment variables in the foomatic-rip filter.
This vulnerability may permit both local and remote attackers to execute
arbitrary commands on the print server with the permissions of the spooler
(oftentimes the "lp" user).
There is no known workaround at this time.
All foomatic users should upgrade to the latest version:
# emerge sync
# emerge -pv ">=net-print/foomatic-3.0.2"
# emerge ">=net-print/foomatic-3.0.2"
PLEASE NOTE: You should update foomatic, instead of foomatic-filters. This
will help to ensure that all other foomatic components remain functional.
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: (C) 2005 Michel Arboi
|DELL POWEREDGE R710 E5630 2.53GHZ 16GB 4 X 250GB SATA H700 512MB
|DELL POWEREDGE R730XD SERVER 24 BAY TWO E5-2637V3 3.5GHZ 96GB 2TB SAS 18 X 800GB
|DELL POWEREDGE R730XD SERVER 24 BAY TWO E5-2697V3 2.6GHZ 128GB 4 X 300GB 15K SAS
|DELL POWEREDGE R730 LFF 8 BAY E5-2609V4 1.7GHZ 256GB 6 X 146GB 15K SAS H330
No Discussions have been posted on this vulnerability.