ID CVE-2004-0801
Summary Unknown vulnerability in foomatic-rip in Foomatic before 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.
References
Vulnerable Configurations
  • cpe:2.3:a:linuxprinting.org:foomatic-filters:3.0
    cpe:2.3:a:linuxprinting.org:foomatic-filters:3.0
  • cpe:2.3:a:linuxprinting.org:foomatic-filters:3.0.1
    cpe:2.3:a:linuxprinting.org:foomatic-filters:3.0.1
  • cpe:2.3:a:linuxprinting.org:foomatic-filters:3.0.2
    cpe:2.3:a:linuxprinting.org:foomatic-filters:3.0.2
  • cpe:2.3:a:linuxprinting.org:foomatic-filters:3.1
    cpe:2.3:a:linuxprinting.org:foomatic-filters:3.1
  • Sun Java Desktop System 2.0
    cpe:2.3:a:sun:java_desktop_system:2.0
  • cpe:2.3:a:sun:java_desktop_system:2003
    cpe:2.3:a:sun:java_desktop_system:2003
  • Conectiva Linux 10.0
    cpe:2.3:o:conectiva:linux:10.0
  • Conectiva Linux 9.0
    cpe:2.3:o:conectiva:linux:9.0
  • Trustix Secure Linux 2.0
    cpe:2.3:o:trustix:secure_linux:2.0
  • Trustix Secure Linux 2.1
    cpe:2.3:o:trustix:secure_linux:2.1
CVSS
Base: 7.5 (as of 15-06-2005 - 12:51)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SA_2004_031.NASL
    description The remote host is missing the patch for the advisory SUSE-SA:2004:031 (cups). The Common Unix Printing System (CUPS) enables local and remote users to obtain printing functionallity via the Internet Printing Protocol (IPP). Alvaro Martinez Echevarria has found a remote Denial of Service condition within CUPS which allows remote users to make the cups server unresponsive. Additionally the SUSE Security Team has discovered a flaw in the foomatic-rip print filter which is commonly installed along with cups. It allows remote attackers, which are listed in the printing ACLs, to execute arbitrary commands as the printing user 'lp'.
    last seen 2019-02-21
    modified 2010-10-06
    plugin id 14730
    published 2004-09-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=14730
    title SUSE-SA:2004:031: cups
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200409-24.NASL
    description The remote host is affected by the vulnerability described in GLSA-200409-24 (Foomatic: Arbitrary command execution in foomatic-rip filter) There is a vulnerability in the foomatic-filters package. This vulnerability is due to insufficient checking of command-line parameters and environment variables in the foomatic-rip filter. Impact : This vulnerability may allow both local and remote attackers to execute arbitrary commands on the print server with the permissions of the spooler (oftentimes the 'lp' user). Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-12-18
    plugin id 14779
    published 2004-09-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=14779
    title GLSA-200409-24 : Foomatic: Arbitrary command execution in foomatic-rip filter
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_3_HPLIP-110812.NASL
    description This update of hplip fixes : - CVE-2004-0801: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P): This patch originally affected foomatic-rip in CUPS but was found to be in foomatic-rip-hplip too.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75526
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75526
    title openSUSE Security Update : hplip (openSUSE-SU-2011:0950-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_FOOMATIC-FILTERS-1436.NASL
    description A Bug in cupsomatic/foomatic-filters that allowed remote printer users to execute arbitrary commands as the uid of the printer daemon has been fixed (CAN-2004-0801). While the same problem was fixed in earlier products, the fix got lost during package upgrade of foomatic-filters.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 27222
    published 2007-10-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=27222
    title openSUSE 10 Security Update : foomatic-filters (foomatic-filters-1436)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2004-094.NASL
    description The foomatic-rip filter, which is part of foomatic-filters package, contains a vulnerability that allows anyone with access to CUPS, local or remote, to execute arbitrary commands on the server. The updated packages provide a fixed foomatic-rip filter that prevents this kind of abuse.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 14750
    published 2004-09-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=14750
    title Mandrake Linux Security Advisory : printer-drivers (MDKSA-2004:094)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2004-303.NASL
    description Sebastian Krahmer reported a bug in the cupsomatic and foomatic-rip print filters, used by the CUPS print spooler. An attacker who has printing access could send a carefully named file to the print server causing arbitrary commands to be executed as root. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0801 to this issue. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 14789
    published 2004-09-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=14789
    title Fedora Core 2 : foomatic-3.0.1-3.1 (2004-303)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_4_HPLIP-110812.NASL
    description This update of hplip fixes : - CVE-2004-0801: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P): This patch originally affected foomatic-rip in CUPS but was found to be in foomatic-rip-hplip too.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 75861
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=75861
    title openSUSE Security Update : hplip (openSUSE-SU-2011:0950-1)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_HPLIP-110812.NASL
    description This update of hplip fixes : - This patch originally affected foomatic-rip in CUPS but was found to be in foomatic-rip-hplip too. (CVE-2004-0801: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)) - The foomatic print filters of the hplip package contained a remote code execution vulnerability. Remote users, if allowed to access a print server such as CUPS, could execute arbitrary commands as lp system user. (CVE-2011-2697: CVSS v2 Base Score: 6.8 (AV:N/AC:M/Au:N/C:P/I:P/A:P))
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 55981
    published 2011-08-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55981
    title SuSE 11.1 Security Update : hplip (SAT Patch Number 4989)
refmap via4
bid 11184
conectiva CLA-2004:880
mandrake MDKSA-2004:094
sco SCOSA-2005.12
secunia
  • 12557
  • 20312
sunalert
  • 1000757
  • 201005
suse
  • SUSE-SA:2004:031
  • SUSE-SA:2006:026
trustix 2004-0047
xf foomatic-command-execution(17388)
Last major update 25-05-2010 - 00:24
Published 16-09-2004 - 00:00
Last modified 10-07-2017 - 21:30
Back to Top