Gentoo Logo

CUPS: Multiple vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200812-11 / cups
Release Date December 10, 2008
Latest Revision December 10, 2008: 01
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
net-print/cups < 1.3.9-r1 >= 1.3.9-r1 All supported architectures

Related bugreports: #238976, #249727

Synopsis

Several remotely exploitable bugs have been found in CUPS, which allow remote execution of arbitrary code.

2.  Impact Information

Background

CUPS is the Common Unix Printing System.

Description

Several buffer overflows were found in:

  • The read_rle16 function in imagetops (CVE-2008-3639, found by regenrecht, reported via ZDI)
  • The WriteProlog function in texttops (CVE-2008-3640, found by regenrecht, reported via ZDI)
  • The Hewlett-Packard Graphics Language (HPGL) filter (CVE-2008-3641, found by regenrecht, reported via iDefense)
  • The _cupsImageReadPNG function (CVE-2008-5286, reported by iljavs)

Impact

A remote attacker could send specially crafted input to a vulnerable server, resulting in the remote execution of arbitrary code with the privileges of the user running the server.

3.  Resolution Information

Workaround

None this time.

Resolution

All CUPS users should upgrade to the latest version.

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-print/cups-1.3.9-r1"

4.  References



Print

Page updated December 10, 2008

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.