Unrated severityNVD Advisory· Published Dec 17, 2015· Updated May 6, 2026
CVE-2015-8327
CVE-2015-8327
Description
Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.2.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via ` (backtick) characters in a print job.
Affected products
64- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*+ 17 more
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:foomatic-filters:4.0.17:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*+ 35 more
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.46:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.47:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.48:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.64:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.65:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.66:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.67:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.68:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.49:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.50:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.51:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.52:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.53:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.54:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.55:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.56:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.57:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.58:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.59:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.60:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.61:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.62:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.63:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.69:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.70:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.71:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.72:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.73:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.74:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.75:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.76:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/annotate/head:/NEWSnvdVendor Advisory
- bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7406nvd
- lists.opensuse.org/opensuse-updates/2016-01/msg00065.htmlnvd
- rhn.redhat.com/errata/RHSA-2016-0491.htmlnvd
- www.debian.org/security/2015/dsa-3411nvd
- www.debian.org/security/2015/dsa-3429nvd
- www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlnvd
- www.securityfocus.com/bid/78524nvd
- www.ubuntu.com/usn/USN-2831-1nvd
- www.ubuntu.com/usn/USN-2831-2nvd
- bugs.debian.org/cgi-bin/bugreport.cginvd
- lists.debian.org/debian-printing/2015/11/msg00020.htmlnvd
- lists.debian.org/debian-printing/2015/12/msg00001.htmlnvd
News mentions
0No linked articles in our index yet.