Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-053: cups


Vulnerability Assessment Details

RHSA-2005-053: cups

Vulnerability Assessment Summary
Check for the version of the cups packages

Detailed Explanation for this Vulnerability Assessment


Updated CUPS packages that fix several security issues are now available.

This update has been rated as having important security impact by the Red
Hat
Security Response Team.

The Common UNIX Printing System provides a portable printing layer for
UNIX(R) operating systems.

During a source code audit, Chris Evans and others discovered a number of
integer overflow bugs that affected all versions of Xpdf, which also
affects CUPS due to a shared codebase. A possible hacker could construct a
carefully crafted PDF file that could cause CUPS to crash or possibly
execute arbitrary code when opened. This issue was assigned the name
CVE-2004-0888 by The Common Vulnerabilities and Exposures project
(cve.mitre.org). Red Hat Enterprise Linux 4 contained a fix for this issue,
but it was found to be incomplete and left 64-bit architectures vulnerable.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2005-0206 to this issue.

A buffer overflow flaw was found in the Gfx::doImage function of Xpdf which
also affects the CUPS pdftops filter due to a shared codebase. A possible hacker
who has the ability to send a malicious PDF file to a printer could
possibly execute arbitrary code as the "lp" user. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2004-1125 to this issue.

A buffer overflow flaw was found in the ParseCommand function in the
hpgltops program. A possible hacker who has the ability to send a malicious HPGL
file to a printer could possibly execute arbitrary code as the "lp" user.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2004-1267 to this issue.

A buffer overflow flaw was found in the Decrypt::makeFileKey2 function of
Xpdf which also affects the CUPS pdftops filter due to a shared codebase.
A possible hacker who has the ability to send a malicious PDF file to a printer
could possibly execute arbitrary code as the "lp" user. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CVE-2005-0064 to this issue.

The lppasswd utility was found to ignore write errors when modifying the
CUPS passwd file. A local user who is able to fill the associated file
system could corrupt the CUPS password file or prevent future uses of
lppasswd. The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2004-1268 and CVE-2004-1269 to these issues.

The lppasswd utility was found to not verify that the passwd.new file is
different from STDERR, which could permit local users to control output to
passwd.new via certain user input that triggers an error message. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CVE-2004-1270 to this issue.

All users of cups should upgrade to these updated packages, which contain
backported patches to resolve these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2005-053.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Apple Xserver Raid Model A1009
$175.0
Apple Xserver Raid Model A1009 pictureHP DL380 G5 64-bit VT Server 2x Quad-Core 2.66GHz / 32GB Ram / 8x146GB SAS RAID5
$309.0
HP DL380 G5 64-bit VT Server 2x Quad-Core 2.66GHz / 32GB Ram / 8x146GB SAS RAID5 pictureHP DL360 G7 64bit VT Server 2x Hexa-Core 3.06GHz / 48GB Ram / 4x 300GB SAS RAID5
$679.0
HP DL360 G7 64bit VT Server 2x Hexa-Core 3.06GHz / 48GB Ram / 4x 300GB SAS RAID5 pictureDrobo RAID 4-Bay USB 2.0/FireWire 800 with Firewire 800 Cable Included
$50.0
Drobo RAID 4-Bay USB 2.0/FireWire 800 with Firewire 800 Cable Included picture


Discussions

No Discussions have been posted on this vulnerability.