Lucene search

K
gentooGentoo FoundationGLSA-200711-16
HistoryNov 12, 2007 - 12:00 a.m.

CUPS: Memory corruption

2007-11-1200:00:00
Gentoo Foundation
security.gentoo.org
16

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.092 Low

EPSS

Percentile

94.6%

Background

CUPS provides a portable printing layer for UNIX-based operating systems.

Description

Alin Rad Pop (Secunia Research) discovered an off-by-one error in the ippReadIO() function when handling Internet Printing Protocol (IPP) tags that might allow to overwrite one byte on the stack.

Impact

A local attacker could send a specially crafted IPP request containing β€œtextWithLanguage” or β€œnameWithLanguage” tags, leading to a Denial of Service or the execution of arbitrary code with the privileges of the β€œlp” user. If CUPS is configured to allow network printing, this vulnerability might be remotely exploitable.

Workaround

To avoid remote exploitation, network access to CUPS servers on port 631/udp should be restricted. In order to do this, update the β€œListen” setting in cupsd.conf to β€œListen localhost:631” or add a rule to the system’s firewall. However, this will not avoid local users from exploiting this vulnerability.

Resolution

All CUPS users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-print/cups-1.2.12-r2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-print/cups<Β 1.2.12-r2UNKNOWN

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.092 Low

EPSS

Percentile

94.6%