[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UnixWare 7.1.4 : vulnerability in foomatic-rip in Foomatic before 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


______________________________________________________________________________

                        SCO Security Advisory

Subject:                UnixWare 7.1.4 : vulnerability in foomatic-rip in 
Foomatic before 3.0.2 allows local users or remote attackers with access to 
CUPS to execute arbitrary commands
Advisory number:        SCOSA-2005.12
Issue date:             2005 February 07
Cross reference:        sr891400 fz530505 erg712704 CAN-2004-0801
______________________________________________________________________________


1. Problem Description

        Unknown vulnerability in foomatic-rip in Foomatic before
        3.0.2 allows local users or remote attackers with access
        to CUPS to execute arbitrary commands 

        The Common Vulnerabilities and Exposures project (cve.mitre.org) 
        has assigned the name CAN-2004-0801 to this issue.


2. Vulnerable Supported Versions

        System                          Binaries
        ----------------------------------------------------------------------
        UnixWare 7.1.4                  /usr/bin/foomatic-gswrapper
                                        /usr/bin/foomatic-rip

3. Solution

        The proper solution is to install the latest packages.

4. UnixWare 7.1.4

        4.1 Location of Fixed Binaries

        ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.12

        4.2 Verification

        MD5 (erg712704.pkg) = af69594469448a198e30945ff1b975b3

        md5 is available for download from
                ftp://ftp.sco.com/pub/security/tools

        4.3 Installing Fixed Binaries

        Upgrade the affected binaries with the following sequence:

        Download erg712704.pkg to the /var/spool/pkg directory

        # pkgadd -d /var/spool/pkg/erg712704.pkg


5. References

        Specific references for this advisory:
                http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0801
                http://xforce.iss.net/xforce/xfdb/17388

        SCO security resources:
                http://www.sco.com/support/security/index.html

        SCO security advisories via email
                http://www.sco.com/support/forums/security.html

        This security fix closes SCO incidents sr891400 fz530505
        erg712704.


6. Disclaimer

        SCO is not responsible for the misuse of any of the information
        we provide on this website and/or through our security
        advisories. Our advisories are a service to our customers
        intended to promote secure installation and use of SCO
        products.


7. Acknowledgments

        SCO would like to thank the SuSE Security Team.


______________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (SCO/UNIX_SVR5)

iD8DBQFCB/J9aqoBO7ipriERAnx3AKCXiXQ6TfOz8fwFieGgPI3Y/mB5uwCgmu08
VWlt2WkYyb5ND83/elgcNcE=
=RKwz
-----END PGP SIGNATURE-----