Lucene search

K
ubuntuUbuntuUSN-707-1
HistoryJan 12, 2009 - 12:00 a.m.

CUPS vulnerabilities

2009-01-1200:00:00
ubuntu.com
41

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.2 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.864 High

EPSS

Percentile

98.6%

Releases

  • Ubuntu 8.10
  • Ubuntu 8.04
  • Ubuntu 7.10
  • Ubuntu 6.06

Packages

  • cups -
  • cupsys -

Details

It was discovered that CUPS didn’t properly handle adding a large number of RSS
subscriptions. A local user could exploit this and cause CUPS to crash, leading
to a denial of service. This issue only applied to Ubuntu 7.10, 8.04 LTS and
8.10. (CVE-2008-5183)

It was discovered that CUPS did not authenticate users when adding and
cancelling RSS subscriptions. An unprivileged local user could bypass intended
restrictions and add a large number of RSS subscriptions. This issue only
applied to Ubuntu 7.10 and 8.04 LTS. (CVE-2008-5184)

It was discovered that the PNG filter in CUPS did not properly handle certain
malformed images. If a user or automated system were tricked into opening a
crafted PNG image file, a remote attacker could cause a denial of service or
execute arbitrary code with user privileges. In Ubuntu 7.10, 8.04 LTS, and 8.10,
attackers would be isolated by the AppArmor CUPS profile. (CVE-2008-5286)

It was discovered that the example pstopdf CUPS filter created log files in an
insecure way. Local users could exploit a race condition to create or overwrite
files with the privileges of the user invoking the program. This issue only
applied to Ubuntu 6.06 LTS, 7.10, and 8.04 LTS. (CVE-2008-5377)

OSVersionArchitecturePackageVersionFilename
Ubuntu8.10noarchcups< 1.3.9-2ubuntu6.1UNKNOWN
Ubuntu8.10noarchcups< bsd-1.3.9-2ubuntu6.1UNKNOWN
Ubuntu8.10noarchcups< client-1.3.9-2ubuntu6.1UNKNOWN
Ubuntu8.10noarchcups< dbg-1.3.9-2ubuntu6.1UNKNOWN
Ubuntu8.10noarchlibcups2< 1.3.9-2ubuntu6.1UNKNOWN
Ubuntu8.10noarchlibcups2< dev-1.3.9-2ubuntu6.1UNKNOWN
Ubuntu8.10noarchlibcupsimage2< 1.3.9-2ubuntu6.1UNKNOWN
Ubuntu8.10noarchlibcupsimage2< dev-1.3.9-2ubuntu6.1UNKNOWN
Ubuntu8.04noarchcupsys< 1.3.7-1ubuntu3.3UNKNOWN
Ubuntu8.04noarchcupsys-bsd< 1.3.7-1ubuntu3.3UNKNOWN
Rows per page:
1-10 of 291

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

8.2 High

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.864 High

EPSS

Percentile

98.6%