Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2003:001: cups


Vulnerability Assessment Details

MDKSA-2003:001: cups

Vulnerability Assessment Summary
Check for the version of the cups package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2003:001 (cups).


iDefense reported several security problems in CUPS that can lead to local and
remote root compromise. An integer overflow in the HTTP interface can be used to
gain remote access with CUPS privilege. A local file race condition can be used
to gain root privilege, although the previous bug must be exploited first. An
attacker can remotely add printers to the vulnerable system. A remote DoS can be
accomplished due to negative length in the memcpy() call. An integer overflow in
image handling code can be used to gain higher privilege. A possible hacker can gain
local root privilege due to a buffer overflow of the 'options' buffer. A design
problem can be exploited to gain local root access, however this needs an added
printer (which can also be done, as per a previously noted bug). Wrong handling
of zero-width images can be abused to gain higher privilege. Finally, a file
descriptor leak and DoS due to missing checks of return values of file/socket
operations.
MandrakeSoft recommends all users upgrade these CUPS packages immediately.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:001
Network Security Threat Level: High

Networks Security ID: 6433, 6434, 6435, 6436, 6437, 6438, 6439, 6440, 6475

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Cisco GLC-LH-SM 1310nm single mode long haul sfp 30-1299-01 original
$15.0
Cisco GLC-LH-SM 1310nm single mode long haul sfp 30-1299-01 original pictureJuniper JXU-16GE-TX-S 16-port 10/100/1000 für SSG-550M SSG-520M J4350 J6350
$318.34
Juniper JXU-16GE-TX-S 16-port 10/100/1000 für SSG-550M SSG-520M J4350 J6350 picture1pcs x Intel E10GSFPSR FTLX8571D3BCV-IT E65689-001 SFP+ Transceiver For X520-DA2
$0.01
1pcs x Intel E10GSFPSR FTLX8571D3BCV-IT E65689-001 SFP+ Transceiver For X520-DA2 pictureCisco SFP-GE-S 10000BASE-SX 850nm LC Transceiver NEW
$19.99
Cisco SFP-GE-S 10000BASE-SX 850nm LC Transceiver NEW picture


Discussions

No Discussions have been posted on this vulnerability.