Common Vulnerabilities and Exposures assigned an identifier CVE-2008-5718 to the following vulnerability:
The papd daemon in Netatalk before 2.0.4-beta2 allows remote attackers to
execute arbitrary commands via shell metacharacters in a print request. NOTE:
some of these details are obtained from third party information.
Further discussion about this flaw and the fix:
Patch in the upstream CVS:
Created attachment 329361 [details]
From DSA-1705-1 (http://www.debian.org/security/2009/dsa-1705), quotes few more special shell characters.
This issue affects all versions of the netatalk package, as shipped
with Fedora releases of 9, 10 and devel.
Extended bad characters blacklist as used in Debian patch was found incomplete as well: http://www.openwall.com/lists/oss-security/2009/01/28/10
More complete blacklist is now committed in upstream CVS:
netatalk-2.0.3-23.fc10 has been submitted as an update for Fedora 10.
netatalk-2.0.3-21.fc9 has been submitted as an update for Fedora 9.
netatalk-2.0.3-21.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report.
netatalk-2.0.3-23.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.