cups is vulnerable to arbitrary code execution. An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, βimagetopsβ and βimagetorasterβ. An attacker could create a malicious TIFF file that could, potentially, execute arbitrary code as the βlpβ user if the file was printed.
lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html
secunia.com/advisories/34481
secunia.com/advisories/34722
secunia.com/advisories/34747
secunia.com/advisories/34756
secunia.com/advisories/34852
security.gentoo.org/glsa/glsa-200904-20.xml
wiki.rpath.com/Advisories:rPSA-2009-0061
www.cups.org/articles.php?L582
www.cups.org/str.php?L3031
www.debian.org/security/2009/dsa-1773
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2009-0428.html
www.redhat.com/support/errata/RHSA-2009-0429.html
www.securityfocus.com/archive/1/502750/100/0/threaded
www.securityfocus.com/bid/34571
www.securitytracker.com/id?1022070
www.ubuntu.com/usn/usn-760-1
access.redhat.com/errata/RHSA-2009:0429
bugzilla.redhat.com/show_bug.cgi?id=490596
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11546