tags 510585 + patch
thanks

Hi,
* Stefan Fritsch <s...@sfritsch.de> [2009-01-03 14:33]:
> the following CVE (Common Vulnerabilities & Exposures) id was
> published for netatalk.
> 
> CVE-2008-5718[0]:
> | The papd daemon in Netatalk before 2.0.4-beta2 allows remote attackers
> | to execute arbitrary commands via shell metacharacters in a print
> | request.  NOTE: some of these details are obtained from third party
> | information.
[...] 

Upstream fix:
http://netatalk.cvs.sourceforge.net/viewvc/netatalk/netatalk/etc/papd/lp.c?r1=1.16&r2=1.17&view=patch

I can confirm that an attacker can execute arbitrary code 
without this fix. The output of the pixelate function is 
just put into popen without any sanitization.

Cheers
NIco
-- 
Nico Golde - http://www.ngolde.de - n...@jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpFJDEn8ck1S.pgp
Description: PGP signature

Reply via email to