source: https://www.securityfocus.com/bid/48982/info
foomatic-gui is prone to a remote arbitrary shell-command-execution vulnerability because the application fails to properly sanitize user-supplied input.
An attacker can exploit this issue to execute arbitrary shell commands in the context of the application.
Versions prior to foomatic-gui 0.7.9.5 are vulnerable.
netbios name = oh'notquotezSIF to /etc/samba/smb.conf