foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2011:125 | vendor advisory |
http://www.openwall.com/lists/oss-security/2011/07/18/3 | mailing list exploit patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68993 | vdb entry |
http://www.openwall.com/lists/oss-security/2011/07/13/3 | mailing list exploit patch |
https://bugzilla.redhat.com/show_bug.cgi?id=721001 | patch exploit |
http://www.openwall.com/lists/oss-security/2011/07/28/1 | mailing list exploit patch |
http://www.ubuntu.com/usn/USN-1194-1 | vendor advisory |
https://bugzilla.novell.com/show_bug.cgi?id=698451 | patch exploit |
http://security.gentoo.org/glsa/glsa-201203-07.xml | vendor advisory |
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf |