Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2003:001: cups


Vulnerability Assessment Details

MDKSA-2003:001: cups

Vulnerability Assessment Summary
Check for the version of the cups package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2003:001 (cups).


iDefense reported several security problems in CUPS that can lead to local and
remote root compromise. An integer overflow in the HTTP interface can be used to
gain remote access with CUPS privilege. A local file race condition can be used
to gain root privilege, although the previous bug must be exploited first. An
attacker can remotely add printers to the vulnerable system. A remote DoS can be
accomplished due to negative length in the memcpy() call. An integer overflow in
image handling code can be used to gain higher privilege. A possible hacker can gain
local root privilege due to a buffer overflow of the 'options' buffer. A design
problem can be exploited to gain local root access, however this needs an added
printer (which can also be done, as per a previously noted bug). Wrong handling
of zero-width images can be abused to gain higher privilege. Finally, a file
descriptor leak and DoS due to missing checks of return values of file/socket
operations.
MandrakeSoft recommends all users upgrade these CUPS packages immediately.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:001
Network Security Threat Level: High

Networks Security ID: 6433, 6434, 6435, 6436, 6437, 6438, 6439, 6440, 6475

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Dell PowerEdge R610 2x X5670 2.93GHz 6 Core 32GB 6x 300GB 15K SAS PERC 6/i
$1343.0
Dell PowerEdge R610 2x X5670 2.93GHz 6 Core 32GB 6x 300GB 15K SAS PERC 6/i pictureNVIDIA TESLA M60 Server GPU Accelerator Processing Card 16GB 0PK3RJ
$2499.99
NVIDIA TESLA M60 Server GPU Accelerator Processing Card 16GB 0PK3RJ pictureDELL POWEREDGE R720 8B 2.5 SERVER TWO E5-2609 2.40GHZ 48GB 1.2TB 10K SAS H310
$2409.0
DELL POWEREDGE R720 8B 2.5 SERVER TWO E5-2609 2.40GHZ 48GB 1.2TB 10K SAS H310 pictureDELL POWEREDGE R820 16 BAY TWO E5-4603V2 2.2GHZ 8GB 4 X 300GB 10K SAS H310
$3919.0
DELL POWEREDGE R820 16 BAY TWO E5-4603V2 2.2GHZ 8GB 4 X 300GB 10K SAS H310 picture


Discussions

No Discussions have been posted on this vulnerability.