Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-5718

Overview

Vulnerability Score 9.3 9.3
CVE Id CVE-2008-5718
Last Modified 02 Apr 2009 12:00:00
Published 26 Dec 2008 12:30:00
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2008-5718

Summary

The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.

Vulnerable Systems

Application

  • Netatalk 1.4.99-0.20000927

  • Netatalk 1.4.99-0.20001108

  • Netatalk 1.5

  • Netatalk 1.5.0

  • Netatalk 1.5.1

  • Netatalk 1.5.1.1

  • Netatalk 1.5.2

  • Netatalk 1.5.3.1

  • Netatalk 1.5.5

  • Netatalk 1.5pre3

  • Netatalk 1.5pre4

  • Netatalk 1.5pre5

  • Netatalk 1.5pre6

  • Netatalk 1.5pre7

  • Netatalk 1.5pre8

  • Netatalk 1.6.0

  • Netatalk 1.6.1

  • Netatalk 1.6.2

  • Netatalk 1.6.3

  • Netatalk 1.6.4

  • Netatalk 1.6.4a

  • Netatalk 2.0

  • Netatalk 2.0.0

  • Netatalk 2.0.1

  • Netatalk 2.0.2

  • Netatalk 2.0.3


References

BID - 32925

DEBIAN - DSA-1705

FEDORA - FEDORA-2009-3069

FEDORA - FEDORA-2009-3064

MLIST - [oss-security] 20090114 update on CVE-2008-5718

CONFIRM - http://sourceforge.net/project/shownotes.php?release_id=648189

SECUNIA - 34484

SECUNIA - 33548

SECUNIA - 33227

OSVDB - 50824

SUSE - SUSE-SR:2009:004

Related Patches

Novell SUSE 2009:5983 netatalk security update for SLE 10 SP2 i586


Last Updated: 27 May 2016 10:48:54