CVE-2011-2924
Summary
| CVE | CVE-2011-2924 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-11-19 22:15:00 UTC |
| Updated | 2020-08-18 15:05:00 UTC |
| Description | foomatic-rip filter v4.0.12 and prior used insecurely creates temporary files for storage of PostScript data by rendering the data when the debug mode was enabled. This flaw may be exploited by a local attacker to conduct symlink attacks by overwriting arbitrary files accessible with the privileges of the user running the foomatic-rip universal print filter. |
Risk And Classification
Problem Types: CWE-59
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 10.0 | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Operating System | Debian | Debian Linux | 10.0 | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Operating System | Debian | Debian Linux | 9.0 | All | All | All |
| Operating System | Fedoraproject | Fedora | 14 | All | All | All |
| Operating System | Fedoraproject | Fedora | 15 | All | All | All |
| Operating System | Fedoraproject | Fedora | 14 | All | All | All |
| Operating System | Fedoraproject | Fedora | 15 | All | All | All |
| Application | Linuxfoundation | Foomatic-filters | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Security [LWN.net] | MISC | lwn.net | Third Party Advisory |
| 726426 – (CVE-2011-2923, CVE-2011-2924) CVE-2011-2923 CVE-2011-2924 foomatic: foomatic-rip (debug mode) insecure temporary file use in renderer command line by processing PostScript data | MISC | bugzilla.redhat.com | Issue Tracking, Third Party Advisory |
| 4.0.12-1 : foomatic-filters package : Ubuntu | MISC | launchpad.net | Release Notes, Third Party Advisory |
| CVE-2011-2924 - Red Hat Customer Portal | MISC | access.redhat.com | Third Party Advisory |
| www.openwall.com/lists/oss-security/2014/02/08/5/1 | MISC | www.openwall.com | Mailing List, Third Party Advisory |
| CVE-2011-2924 | MISC | security-tracker.debian.org | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.