{"containers":{"cna":{"affected":[{"product":"foomatic-filters","vendor":"foomatic-filters","versions":[{"status":"affected","version":"all versions"}]}],"descriptions":[{"lang":"en","value":"foomatic-rip filter, all versions, used insecurely creates temporary files for storage of PostScript data by rendering the data when the debug mode was enabled. This flaw may be exploited by a local attacker to conduct symlink attacks by overwriting arbitrary files accessible with the privileges of the user running the foomatic-rip universal print filter."}],"problemTypes":[{"descriptions":[{"description":"UNKNOWN_TYPE","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-11-19T20:38:08.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"tags":["x_refsource_MISC"],"url":"https://security-tracker.debian.org/tracker/CVE-2011-2923"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2923"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2011-2923"},{"tags":["x_refsource_MISC"],"url":"https://access.redhat.com/security/cve/cve-2011-2923"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T23:15:31.690Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://security-tracker.debian.org/tracker/CVE-2011-2923"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2923"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.suse.com/show_bug.cgi?id=CVE-2011-2923"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://access.redhat.com/security/cve/cve-2011-2923"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2011-2923","datePublished":"2019-11-19T20:38:08.000Z","dateReserved":"2011-07-27T00:00:00.000Z","dateUpdated":"2024-08-06T23:15:31.690Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}