Gentoo Logo

CUPS: Memory corruption

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200711-16 / cups
Release Date November 12, 2007
Latest Revision November 12, 2007: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-print/cups < 1.2.12-r2 >= 1.2.12-r2 All supported architectures

Related bugreports: #196736

Synopsis

CUPS contains a boundary checking error that might lead to the execution of arbitrary code.

2.  Impact Information

Background

CUPS provides a portable printing layer for UNIX-based operating systems.

Description

Alin Rad Pop (Secunia Research) discovered an off-by-one error in the ippReadIO() function when handling Internet Printing Protocol (IPP) tags that might allow to overwrite one byte on the stack.

Impact

A local attacker could send a specially crafted IPP request containing "textWithLanguage" or "nameWithLanguage" tags, leading to a Denial of Service or the execution of arbitrary code with the privileges of the "lp" user. If CUPS is configured to allow network printing, this vulnerability might be remotely exploitable.

3.  Resolution Information

Workaround

To avoid remote exploitation, network access to CUPS servers on port 631/udp should be restricted. In order to do this, update the "Listen" setting in cupsd.conf to "Listen localhost:631" or add a rule to the system's firewall. However, this will not avoid local users from exploiting this vulnerability.

Resolution

All CUPS users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-print/cups-1.2.12-r2"

4.  References



Print

Page updated November 12, 2007

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.