[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UnixWare 7.1.4 : vulnerability in foomatic-rip in Foomatic before 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
 SCO Security Advisory
Subject: UnixWare 7.1.4 : vulnerability in foomatic-rip in 
Foomatic before 3.0.2 allows local users or remote attackers with access to 
CUPS to execute arbitrary commands
Advisory number: SCOSA-2005.12
Issue date: 2005 February 07
Cross reference: sr891400 fz530505 erg712704 CAN-2004-0801
______________________________________________________________________________
1. Problem Description
 Unknown vulnerability in foomatic-rip in Foomatic before
 3.0.2 allows local users or remote attackers with access
 to CUPS to execute arbitrary commands 
 The Common Vulnerabilities and Exposures project (cve.mitre.org) 
 has assigned the name CAN-2004-0801 to this issue.
2. Vulnerable Supported Versions
 System Binaries
 ----------------------------------------------------------------------
 UnixWare 7.1.4 /usr/bin/foomatic-gswrapper
 /usr/bin/foomatic-rip
3. Solution
 The proper solution is to install the latest packages.
4. UnixWare 7.1.4
 4.1 Location of Fixed Binaries
 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.12
 4.2 Verification
 MD5 (erg712704.pkg) = af69594469448a198e30945ff1b975b3
 md5 is available for download from
 ftp://ftp.sco.com/pub/security/tools
 4.3 Installing Fixed Binaries
 Upgrade the affected binaries with the following sequence:
 Download erg712704.pkg to the /var/spool/pkg directory
 # pkgadd -d /var/spool/pkg/erg712704.pkg
5. References
 Specific references for this advisory:
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0801
 http://xforce.iss.net/xforce/xfdb/17388
 SCO security resources:
 http://www.sco.com/support/security/index.html
 SCO security advisories via email
 http://www.sco.com/support/forums/security.html
 This security fix closes SCO incidents sr891400 fz530505
 erg712704.
6. Disclaimer
 SCO is not responsible for the misuse of any of the information
 we provide on this website and/or through our security
 advisories. Our advisories are a service to our customers
 intended to promote secure installation and use of SCO
 products.
7. Acknowledgments
 SCO would like to thank the SuSE Security Team.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (SCO/UNIX_SVR5)
iD8DBQFCB/J9aqoBO7ipriERAnx3AKCXiXQ6TfOz8fwFieGgPI3Y/mB5uwCgmu08
VWlt2WkYyb5ND83/elgcNcE=
=RKwz
-----END PGP SIGNATURE-----

AltStyle によって変換されたページ (->オリジナル) /