netatalk.io

Netatalk Security Advisory

Subject papd daemon vulnerable to remote command execution
CVE ID# CVE-2008-5718
Date 2009/11/10 advisory published retroactively; date is approximate
Versions 2.0.0 - 2.0.4
Summary Remote attacker able to execute arbitrary commands in a print request

Description

The papd daemon in Netatalk contains a vulnerability where specific variables within a pipe command for handling print files can enable remote attackers to run arbitrary commands.

This can be achieved by embedding shell metacharacters in a print request, such as by manipulating the Title field in a maliciously crafted request.

The vulnerability is caused by the papd daemon improperly sanitising several received parameters before passing them in a call to “popen()”. This can be exploited to execute arbitrary commands via a specially crafted printing request.

Successful exploitation requires that a printer is configured to pass arbitrary values as parameters to a piped command.

Patch Availability

Apply the patches with git hash 7fdf387 and f850662 to hotfix your local Netatalk deployment.

Additionally, Netatalk 2.0.5 has been released which contains the security patches. Netatalk administrators are advised to upgrade to this version or apply the patch as soon as possible.

Note that the previous release, Netatalk 2.0.4, contained a partial fix for this vulnerability.

CVSS Calculation

CVSS:2.0/AV:N/AC:M/Au:N/C:C/I:C/A:C (9.3)

Workaround

None.

Credits

Vulnerability found and reported by:

Thomas Biege from the SUSE Security Team

Patch developed by:

Didier Gautheron and Frank Lahm of the Netatalk team


Go back to the Security Policy.