Computer Security
[EN] securityvulns.ru no-pyccku


foomatic code execution
Published:17.08.2011
Source:
SecurityVulns ID:11861
Type:local
Threat Level:
4/10
Description:It's possible to execute code via .ppd files.
Affected:FOOMATIC : Foomatic 4.0
 FOOMATIC : Foomatic 3.11
CVE:CVE-2011-2964 (foomaticrip.c in foomatic-rip in foomatic-filters in Foomatic 4.0.6 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file, a different vulnerability than CVE-2011-2697.)
 CVE-2011-2697 (foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.)
Original documentdocumentMANDRIVA, [ MDVSA-2011:125 ] foomatic-filters (17.08.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod