Lucene search

K
osvGoogleOSV:DSA-232
HistoryJan 20, 2003 - 12:00 a.m.

cupsys - several vulnerabilities

2003-01-2000:00:00
Google
osv.dev
4

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Multiple
vulnerabilities
were discovered in the Common Unix Printing
System (CUPS). Several of these issues represent the potential for a
remote compromise or denial of service. The Common Vulnerabilities
and Exposures project identifies the following problems:


  • CAN-2002-1383
    : Multiple integer overflows allow a remote attacker
    to execute arbitrary code via the CUPSd HTTP interface and the
    image handling code in CUPS filters.

  • CAN-2002-1366
    : Race conditions in connection with /etc/cups/certs/
    allow local users with lp privileges to create or overwrite
    arbitrary files. This is not present in the potato version.

  • CAN-2002-1367
    : This vulnerability allows a remote attacker to add
    printers without authentication via a certain UDP packet, which can
    then be used to perform unauthorized activities such as stealing
    the local root certificate for the administration server via a
    “need authorization” page.

  • CAN-2002-1368
    : Negative lengths fed into memcpy() can cause a
    denial of service and possibly execute arbitrary code.

  • CAN-2002-1369
    : An unsafe strncat() function call processing the
    options string allows a remote attacker to execute arbitrary code
    via a buffer overflow.

  • CAN-2002-1371
    : Zero width images allows a remote attacker to
    execute arbitrary code via modified chunk headers.

  • CAN-2002-1372
    : CUPS does not properly check the return values of
    various file and socket operations, which could allow a remote
    attacker to cause a denial of service.

  • CAN-2002-1384
    : The cupsys package contains some code from the xpdf
    package, used to convert PDF files for printing, which contains an
    exploitable integer overflow bug. This is not present in the
    potato version.

Even though we tried very hard to fix all problems in the packages for
potato as well, the packages may still contain other security related
problems. Hence, we advise users of potato systems using CUPS to
upgrade to woody soon.

For the current stable distribution (woody), these problems have been fixed
in version 1.1.14-4.3.

For the old stable distribution (potato), these problems have been fixed
in version 1.0.4-12.1.

For the unstable distribution (sid), these problems have been fixed in
version 1.1.18-1.

We recommend that you upgrade your CUPS packages immediately.

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C