The send_data_to_stdout function in prnt/hpijs/hpcupsfax.cpp in HP Linux Imaging and Printing (HPLIP) 3.x before 3.11.10 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hpcupsfax.out temporary file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://bugzilla.novell.com/show_bug.cgi?id=704608 | |
http://secunia.com/advisories/55083 | third party advisory |
http://www.ubuntu.com/usn/USN-1981-1 | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2013-0133.html | vendor advisory |
https://bugs.launchpad.net/hplip/+bug/809904 | |
https://bugzilla.redhat.com/attachment.cgi?id=515866&action=diff | |
http://hplipopensource.com/hplip-web/release_notes.html | patch vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=725830 | |
http://security.gentoo.org/glsa/glsa-201203-17.xml | vendor advisory |
http://www.openwall.com/lists/oss-security/2011/07/26/14 | mailing list |
http://secunia.com/advisories/48441 | third party advisory |