Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Detailed Explanation for this Vulnerability Assessment
These remote packages are missing security patches :
A flaw was detected in the printer access control list checking in the
CUPS server. Printer names were compared in a case sensitive manner
by modifying the capitalization of printer names, a remote attacker
could circumvent ACLs and print to printers he should not have access
The Ubuntu 5.04 version of cupsys is not vulnerable against this.
Upgrade to :
- cupsys-1.1.20final+cvs20040330-4ubuntu16.5 (Ubuntu 4.10)
- cupsys-bsd-1.1.20final+cvs20040330-4ubuntu16.5 (Ubuntu 4.10)
- cupsys-client-1.1.20final+cvs20040330-4ubuntu16.5 (Ubuntu 4.10)
- libcupsimage2-1.1.20final+cvs20040330-4ubuntu16.5 (Ubuntu 4.10)
- libcupsimage2-dev-1.1.20final+cvs20040330-4ubuntu16.5 (Ubuntu 4.10)
- libcupsys2-dev-1.1.20final+cvs20040330-4ubuntu16.5 (Ubuntu 4.10)
- libcupsys2-gnutls10-1.1.20final+cvs20040330-4ubuntu16.5 (Ubuntu 4.10)
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: Ubuntu Security Notice (C) 2005 Canonical, Inc. / NASL script (C) 2005 Michel Arboi
|New VTG Sealed Genius NetMouse 9-pin Serial Mouse Scroll Button & Driver 400dpi
|Compaq Portable III 2660. Vintage 80s Luggable suitcase computer. Powers on.
|VINTAGE WESTERN DIGITAL CAVIAR WDAC22100-18H 2.1GB 3.5" IDE HDD
|VINTAGE WINDOWS 98SE / DOS GAMING PC. 1700 VINTAGE GAMES PRE-INSTALLED
No Discussions have been posted on this vulnerability.