CVE-2011-2924Link Following in Foomatic-filters

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 68.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 19
Latest updateApr 22

Description

foomatic-rip filter v4.0.12 and prior used insecurely creates temporary files for storage of PostScript data by rendering the data when the debug mode was enabled. This flaw may be exploited by a local attacker to conduct symlink attacks by overwriting arbitrary files accessible with the privileges of the user running the foomatic-rip universal print filter.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

Also affects: Debian Linux 10.0, 8.0, 9.0, Fedora 14, 15

🔴Vulnerability Details

3
GHSA
GHSA-hp49-99r6-whjr: foomatic-rip filter v42022-04-22
OSV
CVE-2011-2924: foomatic-rip filter v42019-11-19
CVEList
CVE-2011-2924: foomatic-rip filter v42019-11-19

📋Vendor Advisories

2
Red Hat
foomatic: foomatic-rip (debug mode) insecure temporary file use in renderer command line by processing PostScript data2011-07-28
Debian
CVE-2011-2924: foomatic-filters - foomatic-rip filter v4.0.12 and prior used insecurely creates temporary files fo...2011

💬Community

1
Bugzilla
CVE-2011-2923 CVE-2011-2924 foomatic: foomatic-rip (debug mode) insecure temporary file use in renderer command line by processing PostScript data2011-07-28
CVE-2011-2924 — Link Following in Foomatic-filters | cvebase