Descriptionfoomaticrip.c in foomatic-rip in foomatic-filters in Foomatic 4.0.6 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file, a different vulnerability than CVE-2011-2697.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
foomatic-filters (PTS)wheezy, wheezy (security)4.0.17-1+deb7u1fixed
jessie (security), jessie4.0.17-5+deb8u1fixed
buster, stretch, sid4.0.17-9fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


There two implementation of the affected filter: the version from foomatic-filters
4.0 is written in C and has been assigned CVE-2011-2964 and the version in
foomatic-filters 3.x is written in Perl and has been assigned CVE-2011-2697
Fixed in foomatic-filters 4.0.8

Search for package or bug name: Reporting problems