Bug 662740 - (CVE-2010-4267) CVE-2010-4267 hplip: remote stack overflow vulnerability
CVE-2010-4267 hplip: remote stack overflow vulnerability
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
public=20110110,reported=20101207,sou...
: Security
Depends On: 663472 663473 663474 663475 663476 663477 670252 833909 833911
Blocks:
  Show dependency treegraph
 
Reported: 2010-12-13 14:08 EST by Vincent Danen
Modified: 2012-12-07 12:59 EST (History)
4 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-12-07 12:59:55 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)
patch provided by Sebastian to correct the flaw (472 bytes, patch)
2010-12-13 14:11 EST, Vincent Danen
no flags Details | Diff

  None (edit)
Description Vincent Danen 2010-12-13 14:08:17 EST
Sebastian Krahmer reported a flaw in how hplip discovered SNMP devices.  If
certain hplip commands were run that queried SNMP devices, and a malicious user
were able to send crafted SNMP responses, it could cause the running hplip tool
to crash or, possibly, execute arbitrary code with the privileges of the user
running the tool.

Acknowledgements:

Red Hat would like to thank Sebastian Krahmer of the SuSE Security Team for reporting this issue.
Comment 2 Vincent Danen 2010-12-13 14:11:55 EST
Created attachment 468455 [details]
patch provided by Sebastian to correct the flaw
Comment 28 Jan Lieskovsky 2011-01-17 11:53:05 EST
Created hplip tracking bugs for this issue

Affects: fedora-all [bug 670252]
Comment 29 errata-xmlrpc 2011-01-17 12:47:15 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2011:0154 https://rhn.redhat.com/errata/RHSA-2011-0154.html

Note You need to log in before you can comment on or make changes to this bug.