First published: Tue Jun 02 2015(Updated: )
It was reported that the hp-plugin utility, included in the hplip package, downloads a binary driver and verifies it via a key specified by the key's short ID: Downloading plug-in: [\ ] 0% Receiving digital keys: /bin/gpg --homedir /home/test/.hplip/.gnupg --no-permission-warning --keyserver pgp.mit.edu --recv-keys 0xA59047B9 A man-in-the-middle attacker could use this flaw to generate a key with the expected short ID and trick a user into downloading a malicious binary. Original report: <a href="http://seclists.org/oss-sec/2015/q2/581">http://seclists.org/oss-sec/2015/q2/581</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Hewlett-Packard HPLIP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1227252 is classified as moderate due to the potential for remote code execution.
To fix REDHAT-BUG-1227252, update the hplip package to the latest version that addresses this vulnerability.
REDHAT-BUG-1227252 affects systems that have the hplip package installed.
The vulnerability REDHAT-BUG-1227252 involves the hp-plugin utility that downloads a binary driver and verifies it via a specified key.
A temporary workaround for REDHAT-BUG-1227252 is to disable the hp-plugin utility until the package is updated.