Scientific Linux Security Update : hplip on SL5.x i386/x86_64

high Nessus Plugin ID 60266

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

Kees Cook discovered a flaw in the way the hplip hpssd daemon handled user input. A local attacker could send a specially crafted request to the hpssd daemon, possibly allowing them to run arbitrary commands as the root user. (CVE-2007-5208). On Scientific Linux 5, the SELinux targeted policy for hpssd which is enabled by default, blocks the ability to exploit this issue to run arbitrary code.

Solution

Update the affected hpijs, hplip and / or libsane-hpaio packages.

See Also

http://www.nessus.org/u?c7bd1bfc

Plugin Details

Severity: High

ID: 60266

File Name: sl_20071011_hplip_on_SL5_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/11/2007

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Metasploit (HPLIP hpssd.py From Address Arbitrary Command Execution)

Reference Information

CVE: CVE-2007-5208

CWE: 20