|Description||foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)|
|NVD severity||medium (attack range: remote)|
Vulnerable and fixed packages
The table below lists information on source packages.
|foomatic-filters (PTS)||wheezy (security), wheezy||4.0.17-1+deb7u1||fixed|
|jessie (security), jessie||4.0.17-5+deb8u1||fixed|
|hplip (PTS)||wheezy (security), wheezy||3.12.6-3.1+deb7u1||fixed|
The information below is based on the following data on fixed versions.
hplip might have been fixed earlier than stable, current versions use foomatic-rip
from foomatic-filters: /usr/lib/cups/filter/foomatic-rip
There two implementation of the affected filter: the version from foomatic-filters
4.0 is written in C and has been assigned CVE-2011-2964 and the version in
foomatic-filters 3.x is written in Perl and has been assigned CVE-2011-2697
hplip includes local copy of the Perl version. It needs to be checked, whether
it's modified somehow