| VID |
23031 |
| Severity |
40 |
| Port |
631 |
| Protocol |
TCP |
| Class |
CUPS |
| Detailed Description |
The CUPS server is vulnerable to various flaws which allow a remote attacker to shut down the server or even to remotely gain the privileges of the 'lp' user. Easy Software Products' Common Unix Printing System (CUPS) is a cross-platform printing solution for Unix environments. It is based on the "Internet Printing Protocol", and provides complete printing services to most PostScript and raster printers. CUPS has a web-based graphical interface for printer management and is available on most Linux systems. Local and remote attackers can exploit various vulnerabilities on vulnerable CUPS versions to gain 'root' or 'lp' privileges.
* Note: Crashed CUPS daemon must be restarted in order to resume normal operations. If the daemon cannot restart, check for the existence of the following files and remove them: /var/spool/cups/d00*-0* /var/spool/cups/c00*
* CVE links relative these flaws: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1366 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1367 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1368 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1369 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1371 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1372 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1383 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1384
* Platforms Affected: Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 Apple Computer Inc. Debian Project FreeBSD Project MandrakeSoft Inc. NetBSD Foundation Red Hat Inc. Slackware Linux Inc. SuSE Inc. The SCO Group Turbolinux Inc. |
| Recommendation |
Upgrade to the latest version (1.1.18 or later) of CUPS, available from: http://www.cups.org/ |
| Related URL |
CVE-2002-1366 (CVE) |
| Related URL |
6435 (SecurityFocus) |
| Related URL |
10907 (ISS) |
|