Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA950] DSA-950-1 cupsys


Vulnerability Assessment Details

[DSA950] DSA-950-1 cupsys

Vulnerability Assessment Summary
DSA-950-1 cupsys

Detailed Explanation for this Vulnerability Assessment

"infamous41md" and Chris Evans discovered several heap based buffer
overflows in xpdf which are also present in CUPS, the Common UNIX
Printing System, and which can lead to a denial of service by crashing
the application or possibly to the execution of arbitrary code.
For the old stable distribution (woody) these problems have been fixed in
version 1.1.14-5woody14.
CUPS doesn't use the xpdf source anymore since 1.1.22-7, when it switched
to using xpdf-utils for PDF processing.
We recommend that you upgrade your CUPS packages.


Solution : http://www.debian.org/security/2006/dsa-950
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2006 Michel Arboi

Cables, Connectors

Vintage IBM Think pad Laptop Case
$49.99
Vintage IBM Think pad Laptop Case pictureVintage late 1970s Zilog MCZ Z80 system floppy controller for 122 pin backplane
$19.79
Vintage late 1970s Zilog MCZ Z80 system floppy controller for 122 pin backplane pictureVintage ISA Sound Blaster card CT2810 Vibra SB16 Value w/ IDE and Yamaha YMF262
$56.83
Vintage ISA Sound Blaster card CT2810 Vibra SB16 Value w/ IDE and Yamaha YMF262 pictureVintage Texas Instruments TI-99/4A Home Computer w/ Manuals Parsec wumpus
$99.99
Vintage Texas Instruments TI-99/4A Home Computer w/ Manuals Parsec wumpus  picture


Discussions

No Discussions have been posted on this vulnerability.