10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.092 Low
EPSS
Percentile
94.6%
CUPS provides a portable printing layer for UNIX-based operating systems.
Alin Rad Pop (Secunia Research) discovered an off-by-one error in the ippReadIO() function when handling Internet Printing Protocol (IPP) tags that might allow to overwrite one byte on the stack.
A local attacker could send a specially crafted IPP request containing βtextWithLanguageβ or βnameWithLanguageβ tags, leading to a Denial of Service or the execution of arbitrary code with the privileges of the βlpβ user. If CUPS is configured to allow network printing, this vulnerability might be remotely exploitable.
To avoid remote exploitation, network access to CUPS servers on port 631/udp should be restricted. In order to do this, update the βListenβ setting in cupsd.conf to βListen localhost:631β or add a rule to the systemβs firewall. However, this will not avoid local users from exploiting this vulnerability.
All CUPS users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-print/cups-1.2.12-r2"
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Gentoo | any | all | net-print/cups | <Β 1.2.12-r2 | UNKNOWN |