tags 510585 + patch thanks Hi, * Stefan Fritsch <s...@sfritsch.de> [2009-01-03 14:33]: > the following CVE (Common Vulnerabilities & Exposures) id was > published for netatalk. > > CVE-2008-5718[0]: > | The papd daemon in Netatalk before 2.0.4-beta2 allows remote attackers > | to execute arbitrary commands via shell metacharacters in a print > | request. NOTE: some of these details are obtained from third party > | information. [...]
Upstream fix: http://netatalk.cvs.sourceforge.net/viewvc/netatalk/netatalk/etc/papd/lp.c?r1=1.16&r2=1.17&view=patch I can confirm that an attacker can execute arbitrary code without this fix. The output of the pixelate function is just put into popen without any sanitization. Cheers NIco -- Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpFJDEn8ck1S.pgp
Description: PGP signature