hplip

Page content
  • Author: voroskoi
  • Vulnerable: 2.7.7-1
  • Unaffected: 2.7.7-2sayshell1

Kees Cook has reported a vulnerability in HPLIP, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to the hpssd daemon not properly sanitising certain input before using it to invoke sendmail using the “popen3()” method. This can be exploited to execute arbitrary commands with escalated privileges (e.g. “root”) by sending specially crafted requests to the hpssd daemon. NOTE: Depending upon the configuration of hpssd, this may also be remotely exploitable.

CVEs: