First published: Tue Nov 19 2019(Updated: )
foomatic-rip filter v4.0.12 and prior used insecurely creates temporary files for storage of PostScript data by rendering the data when the debug mode was enabled. This flaw may be exploited by a local attacker to conduct symlink attacks by overwriting arbitrary files accessible with the privileges of the user running the foomatic-rip universal print filter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/foomatic-filters | 4.0.17-12 4.0.17-16 | |
Red Hat Foomatic-filters | <=4.0.12 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Fedora | =14 | |
Fedora | =15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2924 has a medium severity rating due to the potential for local attackers to exploit symlink attacks.
To mitigate CVE-2011-2924, upgrade to foomatic-filters version 4.0.17-12 or higher.
CVE-2011-2924 affects foomatic-rip filter versions prior to 4.0.13.
No, CVE-2011-2924 can only be exploited by local attackers.
Debian versions up to 10.0 and Fedora versions up to 15 are vulnerable to CVE-2011-2924.