First published: Mon May 04 2015(Updated: )
Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/foomatic | <0:4.0.4-5.el6_7 | 0:4.0.4-5.el6_7 |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux HPC Node | =6.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =6.7.z | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Foomatic-filters | <=4.0.5 | |
Oracle Linux | =6 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-5325 is classified as a critical vulnerability due to its potential for remote code execution and denial of service.
To mitigate CVE-2010-5325, upgrade the foomatic package to version 4.0.6 or later.
CVE-2010-5325 affects foomatic-filters versions before 4.0.6 and various Red Hat Enterprise Linux environments.
CVE-2010-5325 is a heap-based buffer overflow vulnerability that can lead to memory corruption.
Yes, CVE-2010-5325 can be exploited remotely through crafted job titles sent to the foomatic service.