7.5
CVSSv2

CVE-2010-5325

Published: 15/04/2016 Updated: 27/12/2019
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters prior to 4.0.6 allows remote malicious users to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux workstation 6.0

redhat enterprise linux server 6.0

redhat enterprise linux server eus 6.7.z

redhat enterprise linux desktop 6.0

redhat enterprise linux hpc node 6.0

linuxfoundation foomatic-filters

oracle linux 6

redhat enterprise linux 6.0

Vendor Advisories

It was discovered that foomatic-rip failed to remove all shell special characters from inputs used to construct command lines for external programs run by the filter An attacker could possibly use this flaw to execute arbitrary commands (CVE-2015-8560) It was discovered that the unhtmlify() function of foomatic-rip did not correctly calculate buf ...
It was discovered that the unhtmlify() function of foomatic-rip did not correctly calculate buffer sizes, possibly leading to a heap-based memory corruption A malicious attacker could exploit this flaw to cause foomatic-rip to crash or, possibly, execute arbitrary code ...