{
  "threat_severity" : "Low",
  "public_date" : "2011-07-28T00:00:00Z",
  "bugzilla" : {
    "description" : "foomatic: foomatic-rip (debug mode) insecure temporary file use in renderer command line by processing PostScript data",
    "id" : "726426",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=726426"
  },
  "cvss" : {
    "cvss_base_score" : "1.9",
    "cvss_scoring_vector" : "AV:L/AC:M/Au:N/C:N/I:P/A:N",
    "status" : "draft"
  },
  "cwe" : "CWE-377",
  "details" : [ "foomatic-rip filter v4.0.12 and prior used insecurely creates temporary files for storage of PostScript data by rendering the data when the debug mode was enabled. This flaw may be exploited by a local attacker to conduct symlink attacks by overwriting arbitrary files accessible with the privileges of the user running the foomatic-rip universal print filter." ],
  "statement" : "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 4",
    "fix_state" : "Will not fix",
    "package_name" : "foomatic",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Will not fix",
    "package_name" : "foomatic",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Will not fix",
    "package_name" : "foomatic",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2011-2924\nhttps://nvd.nist.gov/vuln/detail/CVE-2011-2924" ],
  "name" : "CVE-2011-2924",
  "csaw" : false
}