Bug 966830 (CVE-2010-5325) - VUL-1: CVE-2010-5325: foomatic, cups-filters: potential remote arbitrary code execution
Summary: VUL-1: CVE-2010-5325: foomatic, cups-filters: potential remote arbitrary code...
Status: RESOLVED INVALID
Alias: CVE-2010-5325
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Normal
Target Milestone: ---
Assignee: Johannes Meixner
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/161916/
Whiteboard: CVSSv2:SUSE:CVE-2010-5325:5.4:(AV:A/...
Keywords:
Depends on:
Blocks:
 
Reported: 2016-02-16 09:34 UTC by Sebastian Krahmer
Modified: 2021-01-05 12:36 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sebastian Krahmer 2016-02-16 09:34:51 UTC
Via OSS-sec:

>A buffer-overflow vulnerability was discovered in the unhtmlify()
>function of foomatic-rip. The function did not properly calculate
>buffer sizes, possibly leading to a heap-based memory corruption. A
>remote, unauthenticated attacker could exploit this flaw to cause
>foomatic-rip to crash or possibly execute arbitrary code.
>
>https://bugs.linuxfoundation.org/show_bug.cgi?id=515
>https://bugzilla.redhat.com/show_bug.cgi?id=1218297

Use CVE-2010-5325.

(Although https://bugzilla.redhat.com/show_bug.cgi?id=1218297#c2
also has a mention of "an off-by-one-ish problem" in addition to the
larger problem, there will not be multiple CVE IDs for this.)


References:
https://bugzilla.redhat.com/show_bug.cgi?id=1218297
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-5325
http://seclists.org/oss-sec/2016/q1/341
http://people.canonical.com/~ubuntu-security/cve/2010/CVE-2010-5325.html
Comment 2 Sebastian Krahmer 2016-02-16 09:45:56 UTC
Setting exploit range to "Adjacent", as cups service is not really
exposed to outside world and usually only reachanble from inside LAN.
Comment 3 Swamp Workflow Management 2016-02-16 23:00:25 UTC
bugbot adjusting priority
Comment 6 Johannes Meixner 2021-01-05 12:36:25 UTC
According to
https://bugzilla.redhat.com/show_bug.cgi?id=1218297#c2
the issue is about the C program function
"static void unhtmlify(char *dest, size_t size, const char *src)"
that we have only in cups-filters that we have only in SLE12
there in the source file filter/foomatic-rip/options.c

cups-filters in SLE12 is version 1.0.58 from August 2014.

This issue was fixed upstream back in 2010, cf.
https://bugzilla.redhat.com/show_bug.cgi?id=1218297#c0

Our initial cups-filters in SLE12 was from 2012
so we had it fixed all the time.

Accordingly this issue is invalid for us.