First published: Thu Aug 04 2011(Updated: )
It was reported [1] that pysmb.py in system-config-printer does not sanitize a host's netbios name or workgroup/domain name. A specially crafted netbios name on the local network could cause pysmb.py to execute arbitrary commands based on the hostname. This was originally reported in Ubuntu against foomatic-gui, and has been patched [2], however the origin of the script in foomatic-gui is in the system-config-printer package. If a remote SMB server on the local network had a crafted hostname and a user ran pysmb.py, it would be possible for shell commands to be executed with the privileges of the user running pysmb.py. The pysmb.py script in Red Hat Enterprise Linux 6 does not use os.popen(). [1] <a href="https://bugs.launchpad.net/ubuntu/+source/foomatic-gui/+bug/811119">https://bugs.launchpad.net/ubuntu/+source/foomatic-gui/+bug/811119</a> [2] <a href="http://cvs.savannah.gnu.org/viewvc/foomatic-gui/foomatic/pysmb.py?root=foomatic-gui&r1=1.2&r2=1.3&view=patch">http://cvs.savannah.gnu.org/viewvc/foomatic-gui/foomatic/pysmb.py?root=foomatic-gui&r1=1.2&r2=1.3&view=patch</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu foomatic-gui | ||
Red Hat Enterprise Linux | ||
Red Hat system-config-printer |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-728348 is considered high due to the potential for arbitrary command execution.
To fix REDHAT-BUG-728348, you should apply the latest patches and updates provided by your operating system vendor.
REDHAT-BUG-728348 affects system-config-printer on Red Hat Enterprise Linux and Ubuntu systems including foomatic-gui.
REDHAT-BUG-728348 enables attackers on the local network to execute arbitrary commands based on maliciously crafted netbios names.
REDHAT-BUG-728348 primarily involves the pysmb.py component of the system-config-printer application.