7.6
CVSSv2

CVE-2007-5208

Published: 13/10/2007 Updated: 03/10/2018
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
VMScore: 765
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

hpssd in Hewlett-Packard Linux Imaging and Printing Project (hplip) 1.x and 2.x prior to 2.7.10 allows context-dependent malicious users to execute arbitrary commands via shell metacharacters in a from address, which is not properly handled when invoking sendmail.

Vulnerable Product Search on Vulmon Subscribe to Product

hp linux imaging and printing project 1.0

hp linux imaging and printing project

Vendor Advisories

Debian Bug report logs - #447341 CVE-2007-5208 arbitrary command execution via unfiltered from address Package: hplip; Maintainer for hplip is Debian Printing Team <debian-printing@listsdebianorg>; Source for hplip is src:hplip (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Sat, 20 Oct 2007 1 ...
It was discovered that the hpssd tool of hplip did not correctly handle shell meta-characters A local attacker could exploit this to execute arbitrary commands as the hplip user ...
Kees Cook discovered that the hpssd tool of the HP Linux Printing and Imaging System (HPLIP) performs insufficient input sanitising of shell meta characters, which may result in local privilege escalation to the hplip user The old stable distribution (sarge) is not affected by this problem For the stable distribution (etch), this problem has ...

Exploits

## # $Id: hplip_hpssd_execrb 10617 2010-10-09 06:55:52Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' cl ...