First published: Fri Oct 05 2007(Updated: )
Kees Cook of the Ubuntu Security Team has informed us of following security vulnerability in hplip: I just discovered that the hpssd daemon of hplip is vulnerable to arbitrary command injection via its use of popen3. Other local users can run commands as the invoker of hpssd (usually root, hplip, or a local user). By default, it only listens on localhost, but this is configurable via /etc/hp/hplip.conf, so in the worst-case it is possible this could allow remote root command execution. Both 2.x and 1.x series appear vulnerable (but not 0.x which used SMTP). The bug for this is: <a href="https://launchpad.net/bugs/149121">https://launchpad.net/bugs/149121</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Hewlett-Packard HPLIP | >=1.x<3.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-319921 is high due to its potential for arbitrary command injection allowing local users to execute commands with elevated privileges.
To fix REDHAT-BUG-319921, update the HPLIP package to the latest version where the vulnerability has been patched.
Local users of systems running vulnerable versions of HP HPLIP (from 1.x to 3.x) are affected by REDHAT-BUG-319921.
REDHAT-BUG-319921 is caused by improper handling of command execution in the hpssd daemon through the use of popen3.
While specific public exploits may not be reported, the nature of the vulnerability allows for local users to potentially exploit it unless fixed.