Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 28 Jul 2011 11:21:15 +0200
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com,
        "Steven M. Christey"
 <coley@...us.mitre.org>
Subject: Re: CVE Request: hplip/foomatic-filters

On Mon, 18 Jul 2011 14:35:28 +0200 Jan Lieskovsky wrote:

> > The foomatic filters of the hplip package allow remote users
> > to execute arbitrary commands as the lp user. The flaw allows
> > hosts which are listed in the printing ACL or local users to
> > pass PPD file arguments to the foomatic filters. A PoC was
> > demonstrated using the CUPS server.
> >
> > More info and patches are here:
> >
> > https://bugzilla.novell.com/show_bug.cgi?id=698451
> 
> Please use CVE-2011-2697 for this.

According to SUSE bug, there are two different implementations of the
filter - one in perl and one in c - in different foomatic versions.
Both are affected by the same kind of problem, even though they don't
share vulnerable code.  Is one CVE sufficient here, or is Mitre likely
to split and assign another when this is processed? Steven?

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ