SuSE 10 Security Update : hplip17 and hplip17-hpijs (ZYPP Patch Number 4507)

high Nessus Plugin ID 29460

Synopsis

The remote SuSE 10 host is missing a security-related patch.

Description

The deamon 'hpssd' could be exploited by users to execute arbitrary commands as root. hpssd only runs on systems that have HP all-in-one devices configured. In the default configuration the problem is not remotely exploitable as hpssd only listens on local interfaces.
(CVE-2007-5208)

Solution

Apply ZYPP patch number 4507.

See Also

http://support.novell.com/security/cve/CVE-2007-5208.html

Plugin Details

Severity: High

ID: 29460

File Name: suse_hplip17-4507.nasl

Version: 1.19

Type: local

Agent: unix

Published: 12/13/2007

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/9/2007

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (HPLIP hpssd.py From Address Arbitrary Command Execution)

Reference Information

CVE: CVE-2007-5208

CWE: 20