9 lines
No EOL
425 B
Text
9 lines
No EOL
425 B
Text
source: https://www.securityfocus.com/bid/48982/info
|
|
|
|
foomatic-gui is prone to a remote arbitrary shell-command-execution vulnerability because the application fails to properly sanitize user-supplied input.
|
|
|
|
An attacker can exploit this issue to execute arbitrary shell commands in the context of the application.
|
|
|
|
Versions prior to foomatic-gui 0.7.9.5 are vulnerable.
|
|
|
|
netbios name = oh'notquotezSIF to /etc/samba/smb.conf |