Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.122113
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2011-1109)
Summary:The remote host is missing an update for the 'foomatic' package(s) announced via the ELSA-2011-1109 advisory.
Description:Summary:
The remote host is missing an update for the 'foomatic' package(s) announced via the ELSA-2011-1109 advisory.

Vulnerability Insight:
[3.0.2-38.3:.1]
- Applied patch to fix improper sanitization of command line options
(CVE-2011-2697, bug #721001).

Affected Software/OS:
'foomatic' package(s) on Oracle Linux 4, Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-2697
GLSA-201203-07
http://security.gentoo.org/glsa/glsa-201203-07.xml
MDVSA-2011:125
http://www.mandriva.com/security/advisories?name=MDVSA-2011:125
USN-1194-1
http://www.ubuntu.com/usn/USN-1194-1
[oss-security] 20110713 CVE Request: hplip/foomatic-filters
http://www.openwall.com/lists/oss-security/2011/07/13/3
[oss-security] 20110718 Re: CVE Request: hplip/foomatic-filters
http://www.openwall.com/lists/oss-security/2011/07/18/3
[oss-security] 20110728 Re: CVE Request: hplip/foomatic-filters
http://www.openwall.com/lists/oss-security/2011/07/28/1
hplinuxprinting-foomaticriphplip-code-exec(68993)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68993
http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf
https://bugzilla.novell.com/show_bug.cgi?id=698451
https://bugzilla.redhat.com/show_bug.cgi?id=721001
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.