FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

netatalk -- arbitrary command execution in papd daemon

Affected packages
netatalk < 2.0.3_5,1

Details

VuXML ID 72cba7b0-13cd-11de-a964-0030843d3802
Discovery 2008-12-19
Entry 2009-03-18
Modified 2009-03-18

Secunia reports:

A vulnerability has been reported in Netatalk, which potentially can be exploited by malicious users to compromise a vulnerable system.

The vulnerability is caused due to the papd daemon improperly sanitising several received parameters before passing them in a call to popen(). This can be exploited to execute arbitrary commands via a specially crafted printing request.

Successful exploitation requires that a printer is configured to pass arbitrary values as parameters to a piped command.

References

Bugtraq ID 32925
CVE Name CVE-2008-5718
URL http://secunia.com/advisories/33227/
URL http://www.openwall.com/lists/oss-security/2009/01/13/3