FreeBSD : netatalk -- arbitrary command execution in papd daemon (72cba7b0-13cd-11de-a964-0030843d3802)
High Nessus Plugin ID 35963
SynopsisThe remote FreeBSD host is missing a security-related update.
DescriptionSecunia reports :
A vulnerability has been reported in Netatalk, which potentially can be exploited by malicious users to compromise a vulnerable system.
The vulnerability is caused due to the papd daemon improperly sanitising several received parameters before passing them in a call to popen(). This can be exploited to execute arbitrary commands via a specially crafted printing request.
Successful exploitation requires that a printer is configured to pass arbitrary values as parameters to a piped command.
SolutionUpdate the affected package.