Gentoo Logo

CUPS: Denial of service vulnerability


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200409-25 / CUPS
Release Date September 20, 2004
Latest Revision September 21, 2004: 02
Impact normal
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-print/cups < 1.1.20-r2 >= 1.1.20-r2 All supported architectures

Related bugreports: #64168


A vulnerability in CUPS allows remote attackers to cause a denial of service when sending a carefully-crafted UDP packet to the IPP port.

2.  Impact Information


The Common UNIX Printing System (CUPS) is a cross-platform print spooler.


Alvaro Martinez Echevarria discovered a hole in the CUPS Internet Printing Protocol (IPP) implementation that allows remote attackers to cause CUPS to stop listening on the IPP port.


A remote user with malicious intent can easily cause a denial of service to the CUPS daemon by sending a specially-crafted UDP datagram packet to the IPP port.

3.  Resolution Information


There is no known workaround at this time.


All CUPS users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge sync
# emerge -pv ">=net-print/cups-1.1.20-r2"
# emerge ">=net-print/cups-1.1.20-r2"

4.  References


Page updated September 20, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.