Lucene search

K
freebsdFreeBSD72CBA7B0-13CD-11DE-A964-0030843D3802
HistoryDec 19, 2008 - 12:00 a.m.

netatalk -- arbitrary command execution in papd daemon

2008-12-1900:00:00
vuxml.freebsd.org
10

0.013 Low

EPSS

Percentile

85.7%

Secunia reports:

A vulnerability has been reported in Netatalk, which potentially
can be exploited by malicious users to compromise a vulnerable system.
The vulnerability is caused due to the papd daemon improperly
sanitising several received parameters before passing them in a call
to popen(). This can be exploited to execute arbitrary commands via
a specially crafted printing request.
Successful exploitation requires that a printer is configured to
pass arbitrary values as parameters to a piped command.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchnetatalk< 2.0.3_5,1UNKNOWN

0.013 Low

EPSS

Percentile

85.7%