Kees Cook has reported a vulnerability in HPLIP, which can be exploited by malicious, local users to gain escalated privileges.
The vulnerability is caused due to the hpssd daemon not properly sanitising certain input before using it to invoke sendmail using the "popen3()" method. This can be exploited to execute arbitrary commands with escalated privileges (e.g. "root") by sending specially crafted requests to the hpssd daemon.
NOTE: Depending upon the configuration of hpssd, this may also be remotely exploitable.
Solution: Update to version 2.7.10.
Provided and/or discovered by: Kees Cook, Ubuntu Security Team
Original Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=319921
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org