Bug 480641 (CVE-2008-5718) - CVE-2008-5718 netatalk: papd command injection vulnerability
Summary: CVE-2008-5718 netatalk: papd command injection vulnerability
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-5718
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://nvd.nist.gov/nvd.cfm?cvename=C...
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-01-19 16:35 UTC by Tomas Hoger
Modified: 2019-09-29 12:28 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-12-24 03:53:53 UTC


Attachments (Terms of Use)
Debian patch (2.21 KB, patch)
2009-01-19 16:37 UTC, Tomas Hoger
no flags Details | Diff

Description Tomas Hoger 2009-01-19 16:35:42 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2008-5718 to the following vulnerability:

The papd daemon in Netatalk before 2.0.4-beta2 allows remote attackers to
execute arbitrary commands via shell metacharacters in a print request. NOTE:
some of these details are obtained from third party information.

References:
http://sourceforge.net/project/shownotes.php?release_id=648189
http://osvdb.org/50824
http://secunia.com/advisories/33227
http://www.debian.org/security/2009/dsa-1705

Further discussion about this flaw and the fix:
http://www.openwall.com/lists/oss-security/2009/01/13/3
http://sourceforge.net/mailarchive/forum.php?thread_name=20090109110344.GA24977%40suse.de&forum_name=netatalk-devel

Patch in the upstream CVS:
http://netatalk.cvs.sourceforge.net/viewvc/netatalk/netatalk/etc/papd/lp.c?r1=1.16&r2=1.17

Comment 1 Tomas Hoger 2009-01-19 16:37:02 UTC
Created attachment 329361 [details]
Debian patch

From DSA-1705-1 (http://www.debian.org/security/2009/dsa-1705), quotes few more special shell characters.

Comment 2 Jan Lieskovsky 2009-01-27 08:59:25 UTC
This issue affects all versions of the netatalk package, as shipped
with Fedora releases of 9, 10 and devel.

Please fix.

Comment 4 Tomas Hoger 2009-01-28 18:29:13 UTC
Extended bad characters blacklist as used in Debian patch was found incomplete as well:  http://www.openwall.com/lists/oss-security/2009/01/28/10

More complete blacklist is now committed in upstream CVS:
http://netatalk.cvs.sourceforge.net/viewvc/netatalk/netatalk/etc/papd/lp.c?r1=1.21&r2=1.22

Comment 5 Fedora Update System 2009-03-25 15:32:13 UTC
netatalk-2.0.3-23.fc10 has been submitted as an update for Fedora 10.
http://admin.fedoraproject.org/updates/netatalk-2.0.3-23.fc10

Comment 6 Fedora Update System 2009-03-25 15:32:18 UTC
netatalk-2.0.3-21.fc9 has been submitted as an update for Fedora 9.
http://admin.fedoraproject.org/updates/netatalk-2.0.3-21.fc9

Comment 7 Fedora Update System 2009-03-26 14:55:06 UTC
netatalk-2.0.3-21.fc9 has been pushed to the Fedora 9 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 8 Fedora Update System 2009-03-26 14:55:48 UTC
netatalk-2.0.3-23.fc10 has been pushed to the Fedora 10 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.