Format string vulnerability in the ReportSysLogEvent function in the LPD server in cyan soft Opium OPI Server 4.10.1028 and earlier; cyanPrintIP Easy OPI, Professional, and Basic 4.10.1030 and earlier; Workstation 4.10.836 and earlier; and Standard 4.10.940 and earlier; might allow remote attackers to execute arbitrary code via format string specifiers in the queue name in a request.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2008/0498 | vdb entry |
http://www.securityfocus.com/archive/1/487955/100/0/threaded | mailing list |
http://secunia.com/advisories/28870 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/27728 | vdb entry exploit |
http://www.securityfocus.com/bid/27734 | vdb entry |
http://aluigi.altervista.org/adv/cyanuro-adv.txt |