Improper Input Validation Affecting system-config-printer package, versions <1.3.7-1


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
3.22% (92nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN9-SYSTEMCONFIGPRINTER-273970
  • published29 Nov 2011
  • disclosed29 Nov 2011

Introduced: 29 Nov 2011

CVE-2011-4405  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade Debian:9 system-config-printer to version 1.3.7-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream system-config-printer package and not the system-config-printer package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.

The cupshelpers scripts in system-config-printer in Ubuntu 11.04 and 11.10, as used by the automatic printer driver download service, uses an "insecure connection" for queries to the OpenPrinting database, which allows remote attackers to execute arbitrary code via a man-in-the-middle (MITM) attack that modifies packages or repositories.

CVSS Scores

version 3.1