Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA950] DSA-950-1 cupsys


Vulnerability Assessment Details

[DSA950] DSA-950-1 cupsys

Vulnerability Assessment Summary
DSA-950-1 cupsys

Detailed Explanation for this Vulnerability Assessment

"infamous41md" and Chris Evans discovered several heap based buffer
overflows in xpdf which are also present in CUPS, the Common UNIX
Printing System, and which can lead to a denial of service by crashing
the application or possibly to the execution of arbitrary code.
For the old stable distribution (woody) these problems have been fixed in
version 1.1.14-5woody14.
CUPS doesn't use the xpdf source anymore since 1.1.22-7, when it switched
to using xpdf-utils for PDF processing.
We recommend that you upgrade your CUPS packages.


Solution : http://www.debian.org/security/2006/dsa-950
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2006 Michel Arboi

Cables, Connectors

Dell Poweredge T610 Server 8 Cores 2x E5620 2.4Ghz 56GB 2x 73GB 10k PERC RAID
$99.99
Dell Poweredge T610 Server 8 Cores 2x E5620 2.4Ghz 56GB 2x 73GB 10k PERC RAID pictureIntel Xeon W3680 3.33GHz Hex Core SLBV2
$50.0
Intel Xeon W3680 3.33GHz Hex Core SLBV2  pictureMIXED LOT OF 6: Intel Xeon / Core 2 duo x2 E5320 x1 E5504 x1 E5405 x2 E6850 CPU
$14.99
MIXED LOT OF 6: Intel Xeon / Core 2 duo x2 E5320 x1 E5504 x1 E5405 x2 E6850 CPU picturePowerEdge 2850 - 2x2.8 GHz Xeon Dual Core - 2 GB RAM - SCSI 64-Bit
$69.5
PowerEdge 2850 - 2x2.8 GHz Xeon Dual Core - 2 GB RAM - SCSI 64-Bit picture


Discussions

No Discussions have been posted on this vulnerability.