Format string vulnerability in the ReportSysLogEvent function in the LPD server in cyan soft Opium OPI Server 4.10.1028 and earlier; cyanPrintIP Easy OPI, Professional, and Basic 4.10.1030 and earlier; Workstation 4.10.836 and earlier; and Standard 4.10.940 and earlier; might allow remote attackers to execute arbitrary code via format string specifiers in the queue name in a request.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cyanprintip_basic | Cyan_soft | * | 4.10.1030 (including) |
Cyanprintip_easy_opi | Cyan_soft | * | 4.10.1030 (including) |
Cyanprintip_professional | Cyan_soft | * | 4.10.1030 (including) |
Cyanprintip_standard | Cyan_soft | * | 4.10.940 (including) |
Cyanprintip_workstation | Cyan_soft | * | 4.10.836 (including) |
Opium4_opi_server | Cyan_soft | * | 4.10.1028 (including) |