ID

VAR-201108-0226


CVE

CVE-2011-2899


TITLE

foomatic-gui Used in other products pysmb.py Vulnerable to arbitrary command execution

Trust: 0.8

sources: JVNDB: JVNDB-2011-002214

DESCRIPTION

pysmb.py in system-config-printer 0.6.x and 0.7.x, as used in foomatic-gui and possibly other products, allows remote SMB servers to execute arbitrary commands via shell metacharacters in the (1) NetBIOS or (2) workgroup name, which are not properly handled when searching for network printers. The 'system-config-printer' package is prone to a local privilege-escalation vulnerability. Local attackers can exploit this issue to execute arbitrary code with the privileges of the user running the affected application. Successful exploits may aid in the compromise of affected computers. A vulnerability exists in pysmb.py of system-config-printer. ---------------------------------------------------------------------- The Secunia CSI 5.0 Beta - now available for testing Find out more, take a free test drive, and share your opinion with us: http://secunia.com/blog/242 ---------------------------------------------------------------------- TITLE: Red Hat update for system-config-printer SECUNIA ADVISORY ID: SA45744 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/45744/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=45744 RELEASE DATE: 2011-08-25 DISCUSS ADVISORY: http://secunia.com/advisories/45744/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/45744/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=45744 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Red Hat has issued an update for system-config-printer. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system. Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ORIGINAL ADVISORY: RHSA-2011:1196-1: https://rhn.redhat.com/errata/RHSA-2011-1196.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: system-config-printer security update Advisory ID: RHSA-2011:1196-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-1196.html Issue date: 2011-08-23 CVE Names: CVE-2011-2899 ===================================================================== 1. Summary: Updated system-config-printer packages that fix one security issue are now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: system-config-printer is a print queue configuration tool with a graphical user interface. It was found that system-config-printer did not properly sanitize NetBIOS and workgroup names when searching for network printers. (CVE-2011-2899) All users of system-config-printer are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. Running instances of system-config-printer must be restarted for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 728348 - CVE-2011-2899 system-config-printer: possible arbitrary code execution in pysmb.py due to improper escaping of hostnames 6. Package List: Red Hat Enterprise Linux AS version 4: Source: ftp://updates.redhat.com/enterprise/4AS/en/os/SRPMS/system-config-printer-0.6.116.10-1.6.el4.src.rpm i386: system-config-printer-0.6.116.10-1.6.el4.i386.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.i386.rpm system-config-printer-gui-0.6.116.10-1.6.el4.i386.rpm ia64: system-config-printer-0.6.116.10-1.6.el4.ia64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.ia64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.ia64.rpm ppc: system-config-printer-0.6.116.10-1.6.el4.ppc.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.ppc.rpm system-config-printer-gui-0.6.116.10-1.6.el4.ppc.rpm s390: system-config-printer-0.6.116.10-1.6.el4.s390.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.s390.rpm system-config-printer-gui-0.6.116.10-1.6.el4.s390.rpm s390x: system-config-printer-0.6.116.10-1.6.el4.s390x.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.s390x.rpm system-config-printer-gui-0.6.116.10-1.6.el4.s390x.rpm x86_64: system-config-printer-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.x86_64.rpm Red Hat Enterprise Linux Desktop version 4: Source: ftp://updates.redhat.com/enterprise/4Desktop/en/os/SRPMS/system-config-printer-0.6.116.10-1.6.el4.src.rpm i386: system-config-printer-0.6.116.10-1.6.el4.i386.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.i386.rpm system-config-printer-gui-0.6.116.10-1.6.el4.i386.rpm x86_64: system-config-printer-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.x86_64.rpm Red Hat Enterprise Linux ES version 4: Source: ftp://updates.redhat.com/enterprise/4ES/en/os/SRPMS/system-config-printer-0.6.116.10-1.6.el4.src.rpm i386: system-config-printer-0.6.116.10-1.6.el4.i386.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.i386.rpm system-config-printer-gui-0.6.116.10-1.6.el4.i386.rpm ia64: system-config-printer-0.6.116.10-1.6.el4.ia64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.ia64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.ia64.rpm x86_64: system-config-printer-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.x86_64.rpm Red Hat Enterprise Linux WS version 4: Source: ftp://updates.redhat.com/enterprise/4WS/en/os/SRPMS/system-config-printer-0.6.116.10-1.6.el4.src.rpm i386: system-config-printer-0.6.116.10-1.6.el4.i386.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.i386.rpm system-config-printer-gui-0.6.116.10-1.6.el4.i386.rpm ia64: system-config-printer-0.6.116.10-1.6.el4.ia64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.ia64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.ia64.rpm x86_64: system-config-printer-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-debuginfo-0.6.116.10-1.6.el4.x86_64.rpm system-config-printer-gui-0.6.116.10-1.6.el4.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/system-config-printer-0.7.32.10-1.el5_7.1.src.rpm i386: system-config-printer-0.7.32.10-1.el5_7.1.i386.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.i386.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.i386.rpm x86_64: system-config-printer-0.7.32.10-1.el5_7.1.x86_64.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.x86_64.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/system-config-printer-0.7.32.10-1.el5_7.1.src.rpm i386: system-config-printer-0.7.32.10-1.el5_7.1.i386.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.i386.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.i386.rpm ia64: system-config-printer-0.7.32.10-1.el5_7.1.ia64.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.ia64.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.ia64.rpm ppc: system-config-printer-0.7.32.10-1.el5_7.1.ppc.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.ppc.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.ppc.rpm s390x: system-config-printer-0.7.32.10-1.el5_7.1.s390x.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.s390x.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.s390x.rpm x86_64: system-config-printer-0.7.32.10-1.el5_7.1.x86_64.rpm system-config-printer-debuginfo-0.7.32.10-1.el5_7.1.x86_64.rpm system-config-printer-libs-0.7.32.10-1.el5_7.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2011-2899.html https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFOU73QXlSAg2UNWIIRAtaOAJ4oVWJE3+Im60upiHPtmPVeJkRb0QCfc8tF stTz73xLpDfC+ZVI/tlNOsA= =up1e -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 2.16

sources: NVD: CVE-2011-2899 // JVNDB: JVNDB-2011-002214 // BID: 49288 // VULHUB: VHN-50844 // PACKETSTORM: 104414 // PACKETSTORM: 104395

AFFECTED PRODUCTS

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.110

Trust: 1.6

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.109

Trust: 1.6

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.115

Trust: 1.6

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.108

Trust: 1.6

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.107

Trust: 1.6

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.114

Trust: 1.6

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.112

Trust: 1.6

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.116

Trust: 1.6

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.111

Trust: 1.6

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.113

Trust: 1.6

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.62

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.17

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.32.9

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.73

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74.12

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.20

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.78

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.81

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74.2

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.24

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.41

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.63

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.67

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.91

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.95

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.2

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.83

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74.6

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.86

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.105

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.74

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.63.1

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.97

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.66

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.0

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.106

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.19

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.78

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74.5

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.90

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.65

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.77

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.8

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.31

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.11

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.33

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.80

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.63

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.15

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.63.4

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.67

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.64

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.88

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.42

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.79

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.26

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.53

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.79

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.68

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.58

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.39

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.56

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.32.6

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.99

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.4

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.75

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.69

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.82.2

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74.9

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.32.8

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.54

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.71

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.28

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.82.5

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.76

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.32.10

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74.8

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.48

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74.3

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.100

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.59

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.25

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.85

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.103

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.43

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.64

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.37

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.40

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.68

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.35

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.12

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.29

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74.13

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.63.3

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.45

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.38

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74.7

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.71

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.66

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.89

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.82.1

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74.10

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.65

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.98

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.51

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.21

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.72

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.3

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.47

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.32

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.101

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.63.2

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.16

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.6

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.75

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.80

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.82

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.104

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.61

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.36

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.82

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.77

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.18

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.60

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.34

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.7

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74.11

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.5

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.102

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.72

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.84

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.70

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.44

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.57

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.96

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.69

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.27

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.73

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.93

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.46

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.9

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.94

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.82.3

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74.4

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.92

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74.1

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.30

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.32.7

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.74

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.13

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.1

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.82.4

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.70

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.61

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.49

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.55

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.60

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.50

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.81

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.10

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.62

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.14

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.52

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.87

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.22

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.6.23

Trust: 1.0

vendor:redhatmodel:system-config-printerscope:eqversion:0.7.76

Trust: 1.0

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:system-config-printerscope:eqversion:0.6.x

Trust: 0.8

vendor:red hatmodel:system-config-printerscope:eqversion:0.7.x

Trust: 0.8

vendor:system config printermodel:system-config-printerscope:eqversion:1.1.3

Trust: 0.3

vendor:system config printermodel:system-config-printerscope:eqversion:1.0

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.1.2

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.1.1

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.2.2

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.2.1

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.2

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.1

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.0.1

Trust: 0.3

vendor:avayamodel:proactive contactscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5.1

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:5

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.3

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.2

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1.1

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.1

Trust: 0.3

vendor:avayamodel:aura presence servicesscope:eqversion:6.0

Trust: 0.3

sources: BID: 49288 // JVNDB: JVNDB-2011-002214 // CNNVD: CNNVD-201108-442 // NVD: CVE-2011-2899

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-2899
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-2899
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201108-442
value: MEDIUM

Trust: 0.6

VULHUB: VHN-50844
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-2899
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-50844
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-50844 // JVNDB: JVNDB-2011-002214 // CNNVD: CNNVD-201108-442 // NVD: CVE-2011-2899

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-50844 // JVNDB: JVNDB-2011-002214 // NVD: CVE-2011-2899

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 104395 // CNNVD: CNNVD-201108-442

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201108-442

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002214

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-50844

PATCH

title:RHSA-2011:1196url:https://rhn.redhat.com/errata/RHSA-2011-1196.html

Trust: 0.8

sources: JVNDB: JVNDB-2011-002214

EXTERNAL IDS

db:NVDid:CVE-2011-2899

Trust: 2.9

db:SECUNIAid:45744

Trust: 2.6

db:SECTRACKid:1025967

Trust: 2.5

db:BIDid:49288

Trust: 1.2

db:OSVDBid:74870

Trust: 0.8

db:JVNDBid:JVNDB-2011-002214

Trust: 0.8

db:CNNVDid:CNNVD-201108-442

Trust: 0.7

db:REDHATid:RHSA-2011:1196

Trust: 0.6

db:PACKETSTORMid:104395

Trust: 0.2

db:VULHUBid:VHN-50844

Trust: 0.1

db:PACKETSTORMid:104414

Trust: 0.1

sources: VULHUB: VHN-50844 // BID: 49288 // JVNDB: JVNDB-2011-002214 // PACKETSTORM: 104414 // PACKETSTORM: 104395 // CNNVD: CNNVD-201108-442 // NVD: CVE-2011-2899

REFERENCES

url:http://www.securitytracker.com/id?1025967

Trust: 2.5

url:http://secunia.com/advisories/45744

Trust: 2.5

url:https://bugzilla.redhat.com/show_bug.cgi?id=728348

Trust: 2.0

url:http://www.redhat.com/support/errata/rhsa-2011-1196.html

Trust: 1.7

url:https://bugs.launchpad.net/ubuntu/+source/foomatic-gui/+bug/811119

Trust: 1.7

url:http://cvs.savannah.gnu.org/viewvc/foomatic-gui/foomatic/pysmb.py?root=foomatic-gui&r1=1.2&r2=1.3&view=patch

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2899

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2899

Trust: 0.8

url:http://osvdb.org/74870

Trust: 0.8

url:http://www.securityfocus.com/bid/49288

Trust: 0.8

url:http://cyberelk.net/tim/software/system-config-printer/

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100148016

Trust: 0.3

url:https://rhn.redhat.com/errata/rhsa-2011-1196.html

Trust: 0.2

url:http://cvs.savannah.gnu.org/viewvc/foomatic-gui/foomatic/pysmb.py?root=foomatic-gui&amp;r1=1.2&amp;r2=1.3&amp;view=patch

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=45744

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/blog/242

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/45744/

Trust: 0.1

url:http://secunia.com/advisories/45744/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2899

Trust: 0.1

url:https://access.redhat.com/kb/docs/doc-11259

Trust: 0.1

url:https://access.redhat.com/security/team/key/#package

Trust: 0.1

url:https://www.redhat.com/security/data/cve/cve-2011-2899.html

Trust: 0.1

url:http://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

sources: VULHUB: VHN-50844 // BID: 49288 // JVNDB: JVNDB-2011-002214 // PACKETSTORM: 104414 // PACKETSTORM: 104395 // CNNVD: CNNVD-201108-442 // NVD: CVE-2011-2899

CREDITS

Vincent Danen

Trust: 0.3

sources: BID: 49288

SOURCES

db:VULHUBid:VHN-50844
db:BIDid:49288
db:JVNDBid:JVNDB-2011-002214
db:PACKETSTORMid:104414
db:PACKETSTORMid:104395
db:CNNVDid:CNNVD-201108-442
db:NVDid:CVE-2011-2899

LAST UPDATE DATE

2024-11-23T21:56:08.445000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-50844date:2012-06-15T00:00:00
db:BIDid:49288date:2011-09-08T15:50:00
db:JVNDBid:JVNDB-2011-002214date:2011-09-15T00:00:00
db:CNNVDid:CNNVD-201108-442date:2011-09-01T00:00:00
db:NVDid:CVE-2011-2899date:2024-11-21T01:29:13.890

SOURCES RELEASE DATE

db:VULHUBid:VHN-50844date:2011-08-31T00:00:00
db:BIDid:49288date:2011-08-04T00:00:00
db:JVNDBid:JVNDB-2011-002214date:2011-09-15T00:00:00
db:PACKETSTORMid:104414date:2011-08-24T03:58:37
db:PACKETSTORMid:104395date:2011-08-24T03:13:07
db:CNNVDid:CNNVD-201108-442date:2011-08-25T00:00:00
db:NVDid:CVE-2011-2899date:2011-08-31T23:55:03.457