blob: e02b8e4f927c594355d04c71e5025eea33739e00 [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<glsa id="201203-17">
<title>HPLIP: Multiple vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been found in HPLIP, the worst of
which may allow execution of arbitrary code.
<product type="ebuild">hplip</product>
<announced>March 16, 2012</announced>
<revised>March 16, 2012: 1</revised>
<access>local, remote</access>
<package name="net-print/hplip" auto="yes" arch="*">
<unaffected range="ge">3.11.10</unaffected>
<vulnerable range="lt">3.11.10</vulnerable>
<p>The Hewlett-Packard Linux Imaging and Printing system (HPLIP) provides
drivers for HP's inkjet and laser printers, scanners and fax machines.
<p>Two vulnerabilities have been found in HPLIP:</p>
<li>The "hpmud_get_pml()" function in pml.c contains a boundary error
which could cause a stack-based buffer overflow (CVE-2010-4267).
<li>The "send_data_to_stdout()" function in hpcupsfax.cpp creates
insecure temporary files (CVE-2011-2722).
<impact type="high">
<p>A remote attacker might send specially crafted SNMP reponses, possibly
resulting in execution of arbitrary code or a Denial of Service
condition. Furthermore, a local attacker could perform symlink attacks to
overwrite arbitrary files.
<p>There is no known workaround at this time.</p>
<p>All HPLIP users should upgrade to the latest version:</p>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=net-print/hplip-3.11.10"
<uri link="">CVE-2010-4267</uri>
<uri link="">CVE-2011-2722</uri>
<metadata timestamp="Fri, 07 Oct 2011 23:38:15 +0000" tag="requester">
<metadata timestamp="Fri, 16 Mar 2012 11:04:44 +0000" tag="submitter">ackle</metadata>