Scientific Linux Security Update : hplip on SL5.x i386/x86_64

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

Kees Cook discovered a flaw in the way the hplip hpssd daemon handled
user input. A local attacker could send a specially crafted request to
the hpssd daemon, possibly allowing them to run arbitrary commands as
the root user. (CVE-2007-5208). On Scientific Linux 5, the SELinux
targeted policy for hpssd which is enabled by default, blocks the
ability to exploit this issue to run arbitrary code.

See also :

http://www.nessus.org/u?7f1784e1

Solution :

Update the affected hpijs, hplip and / or libsane-hpaio packages.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60266 ()

Bugtraq ID:

CVE ID: CVE-2007-5208