Common Vulnerabilities and Exposures assigned an identifier CVE-2008-5718 to the following vulnerability: The papd daemon in Netatalk before 2.0.4-beta2 allows remote attackers to execute arbitrary commands via shell metacharacters in a print request. NOTE: some of these details are obtained from third party information. References: http://sourceforge.net/project/shownotes.php?release_id=648189 http://osvdb.org/50824 http://secunia.com/advisories/33227 http://www.debian.org/security/2009/dsa-1705 Further discussion about this flaw and the fix: http://www.openwall.com/lists/oss-security/2009/01/13/3 http://sourceforge.net/mailarchive/forum.php?thread_name=20090109110344.GA24977%40suse.de&forum_name=netatalk-devel Patch in the upstream CVS: http://netatalk.cvs.sourceforge.net/viewvc/netatalk/netatalk/etc/papd/lp.c?r1=1.16&r2=1.17
Created attachment 329361 [details] Debian patch From DSA-1705-1 (http://www.debian.org/security/2009/dsa-1705), quotes few more special shell characters.
This issue affects all versions of the netatalk package, as shipped with Fedora releases of 9, 10 and devel. Please fix.
Extended bad characters blacklist as used in Debian patch was found incomplete as well: http://www.openwall.com/lists/oss-security/2009/01/28/10 More complete blacklist is now committed in upstream CVS: http://netatalk.cvs.sourceforge.net/viewvc/netatalk/netatalk/etc/papd/lp.c?r1=1.21&r2=1.22
netatalk-2.0.3-23.fc10 has been submitted as an update for Fedora 10. http://admin.fedoraproject.org/updates/netatalk-2.0.3-23.fc10
netatalk-2.0.3-21.fc9 has been submitted as an update for Fedora 9. http://admin.fedoraproject.org/updates/netatalk-2.0.3-21.fc9
netatalk-2.0.3-21.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report.
netatalk-2.0.3-23.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.