Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 14 Nov 2012 10:41:49 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: Vulnerabilities in Oki CUPS printer drivers

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 09/18/2012 02:21 AM, Guido Berhoerster wrote:
> 
> Vulnerabilities in Oki CUPS printer drivers
> 
> The following describes a security vulnerability in several Oki 
> CUPS drivers. While I'm not aware that these drivers are packaged 
> in any ditribution, they are free software (licensed under the GPL 
> v2 or later) and made available via the Oki website and their FTP 
> server so I hope this is on topic here.

Apologies for the delay on this, the files are no longer available on
the Oki ftpsite, so I assume the vendor "fixed" this by removing them?
I managed to dig up some copies of the file through google but they
don't contain the okijobaccounting script or the
rastertookimonochrome. So I can't confirm this (can anyone other than
the original reporter? (e.g. iSIGHT or iDefense? I'm pretty sure you
guys cover Oki as a vendor =).



- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=lvzJ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.