Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2003:001: cups


Vulnerability Assessment Details

MDKSA-2003:001: cups

Vulnerability Assessment Summary
Check for the version of the cups package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2003:001 (cups).


iDefense reported several security problems in CUPS that can lead to local and
remote root compromise. An integer overflow in the HTTP interface can be used to
gain remote access with CUPS privilege. A local file race condition can be used
to gain root privilege, although the previous bug must be exploited first. An
attacker can remotely add printers to the vulnerable system. A remote DoS can be
accomplished due to negative length in the memcpy() call. An integer overflow in
image handling code can be used to gain higher privilege. A possible hacker can gain
local root privilege due to a buffer overflow of the 'options' buffer. A design
problem can be exploited to gain local root access, however this needs an added
printer (which can also be done, as per a previously noted bug). Wrong handling
of zero-width images can be abused to gain higher privilege. Finally, a file
descriptor leak and DoS due to missing checks of return values of file/socket
operations.
MandrakeSoft recommends all users upgrade these CUPS packages immediately.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:001
Network Security Threat Level: High

Networks Security ID: 6433, 6434, 6435, 6436, 6437, 6438, 6439, 6440, 6475

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

DELL POWEREDGE R620 10 BAY TWO E5-2650V2 2.60GHZ 96GB 5 X 1.8TB 10K SAS H710
$3509.0
DELL POWEREDGE R620 10 BAY TWO E5-2650V2 2.60GHZ 96GB 5 X 1.8TB 10K SAS H710 pictureDELL POWEREDGE R630 10 BAY TWO E5-2640V3 2.6GHZ 384GB 4 X 1.6TB SSD H330
$9869.0
DELL POWEREDGE R630 10 BAY TWO E5-2640V3 2.6GHZ 384GB 4 X 1.6TB SSD H330 pictureDELL POWEREDGE R630 10 BAY TWO E5-2609V4 1.7GHZ 64GB 6 X 400GB SSD SAS H330
$6349.0
DELL POWEREDGE R630 10 BAY TWO E5-2609V4 1.7GHZ 64GB 6 X 400GB SSD SAS H330 picture


Discussions

No Discussions have been posted on this vulnerability.