Korean
<< Back
VID 23208
Severity 40
Port 631
Protocol TCP
Class CUPS
Detailed Description The CUPS server, according to its banner, has a stack-based buffer overflow vulnerability in the asn1_get_string function. Easy Software Products' Common UNIX Printing System (CUPS) is a cross-platform printing solution for UNIX environments that is based on the "Internet Printing Protocol". CUPS has a web-based graphical interface for printer management and is available on most Linux systems. CUPS version 1.3.4 and earlier versions are vulnerable to a stack-based buffer overflow vulnerability, caused by an integer signedness error in the "asn1_get_string()" [backend/snmp.c] function. By sending a specially-crafted SNMP responses with negative length values in an asn1 encoded string, a remote attacker could exploit this vulnerability to execute arbitrary code on the system or cause the affected service to crash.

* Note: This check solely relied on the banner of the remote CUPS server to assess this vulnerability, so this might be a false positive.

* References:
http://www.cups.org/str.php?L2589
http://www.cups.org/articles.php?L519
http://www.frsirt.com/english/advisories/2007/4242
http://secunia.com/advisories/28129

* Platforms Affected:
Easy Software Products, CUPS version 1.3.4 and earlier versions
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of CUPS (1.3.5 or later), available from the CUPS Software Web site at http://www.cups.org/software.php
Related URL CVE-2007-5849 (CVE)
Related URL 26917 (SecurityFocus)
Related URL 39101 (ISS)