VID |
23205 |
Severity |
40 |
Port |
631 |
Protocol |
TCP |
Class |
Daemon |
Detailed Description |
The CUPS server, according to its banner, has a stack-based buffer overflow vulnerability in the ippReadIO function. Easy Software Products' Common UNIX Printing System (CUPS) is a cross-platform printing solution for UNIX environments that is based on the "Internet Printing Protocol". CUPS has a web-based graphical interface for printer management and is available on most Linux systems. CUPS version 1.3.3 and earlier versions are vulnerable to a stack-based buffer overflow vulnerability, caused by improper bounds checking by the ippReadIO function in cups/ipp.c. By sending a specially-crafted request with an IPP (Internet Printing Protocol) tag such as 'textWithLanguage' or 'nameWithLanguage' and an overly large text-length value, a remote attacker from within the local network could exploit this vulnerability to execute arbitrary code on the system or cause the affected service to crash.
* Note: This check solely relied on the banner of the remote CUPS server to assess this vulnerability, so this might be a false positive.
* References: http://www.cups.org/str.php?L2561 http://www.cups.org/articles.php?L508 http://secunia.com/secunia_research/2007-76/advisory/ http://www.securityfocus.com/archive/1/483033/30/0/threaded http://www.frsirt.com/english/advisories/2007/3681 http://securitytracker.com/alerts/2007/Oct/1018879.html http://www.kb.cert.org/vuls/id/446897 http://secunia.com/advisories/27233
* Platforms Affected: Easy Software Products, CUPS version 1.3.3 and earlier versions Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of CUPS (1.3.4 or later), available from the CUPS Software Web site at http://www.cups.org/software.php |
Related URL |
CVE-2007-4351 (CVE) |
Related URL |
26268 (SecurityFocus) |
Related URL |
38190 (ISS) |
|