|Description||foomaticrip.c in foomatic-rip in foomatic-filters in Foomatic 4.0.6 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file, a different vulnerability than CVE-2011-2697.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)|
|NVD severity||medium (attack range: remote)|
Vulnerable and fixed packages
The table below lists information on source packages.
|foomatic-filters (PTS)||wheezy, wheezy (security)||4.0.17-1+deb7u1||fixed|
|jessie (security), jessie||4.0.17-5+deb8u1||fixed|
|buster, stretch, sid||4.0.17-9||fixed|
The information below is based on the following data on fixed versions.
There two implementation of the affected filter: the version from foomatic-filters
4.0 is written in C and has been assigned CVE-2011-2964 and the version in
foomatic-filters 3.x is written in Perl and has been assigned CVE-2011-2697
Fixed in foomatic-filters 4.0.8