![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.64070 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Security Advisory RHSA-2009:1083 |
Summary: | The remote host is missing updates announced in;advisory RHSA-2009:1083.;;The Common UNIX Printing System (CUPS) provides a portable printing layer;for UNIX operating systems. The Internet Printing Protocol (IPP) allows;users to print and manage printing-related tasks over a network. The CUPS;pdftops filter converts Portable Document Format (PDF) files to;PostScript. pdftops is based on Xpdf and the CUPS imaging library.;;A NULL pointer dereference flaw was found in the CUPS IPP routine, used for;processing incoming IPP requests for the CUPS scheduler. An attacker could;use this flaw to send specially-crafted IPP requests that would crash the;cupsd daemon. (CVE-2009-0949);;A use-after-free flaw was found in the CUPS scheduler directory services;routine, used to process data about available printers and printer classes.;An attacker could use this flaw to cause a denial of service (cupsd daemon;stop or crash). (CVE-2009-1196);;Multiple integer overflows flaws, leading to heap-based buffer overflows,;were found in the CUPS pdftops filter. An attacker could create a;malicious PDF file that would cause pdftops to crash or, potentially,;execute arbitrary code as the lp user if the file was printed.;(CVE-2009-0791);;Red Hat would like to thank Anibal Sacco from Core Security Technologies;for reporting the CVE-2009-0949 flaw, and Swen van Brussel for reporting;the CVE-2009-1196 flaw.;;Users of cups are advised to upgrade to these updated packages, which;contain backported patches to correct these issues. After installing this;update, the cupsd daemon will be restarted automatically. |
Description: | Summary: The remote host is missing updates announced in advisory RHSA-2009:1083. The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX operating systems. The Internet Printing Protocol (IPP) allows users to print and manage printing-related tasks over a network. The CUPS pdftops filter converts Portable Document Format (PDF) files to PostScript. pdftops is based on Xpdf and the CUPS imaging library. A NULL pointer dereference flaw was found in the CUPS IPP routine, used for processing incoming IPP requests for the CUPS scheduler. An attacker could use this flaw to send specially-crafted IPP requests that would crash the cupsd daemon. (CVE-2009-0949) A use-after-free flaw was found in the CUPS scheduler directory services routine, used to process data about available printers and printer classes. An attacker could use this flaw to cause a denial of service (cupsd daemon stop or crash). (CVE-2009-1196) Multiple integer overflows flaws, leading to heap-based buffer overflows, were found in the CUPS pdftops filter. An attacker could create a malicious PDF file that would cause pdftops to crash or, potentially, execute arbitrary code as the lp user if the file was printed. (CVE-2009-0791) Red Hat would like to thank Anibal Sacco from Core Security Technologies for reporting the CVE-2009-0949 flaw, and Swen van Brussel for reporting the CVE-2009-1196 flaw. Users of cups are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the cupsd daemon will be restarted automatically. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-0791 1022326 http://securitytracker.com/id?1022326 35195 http://www.securityfocus.com/bid/35195 35340 http://secunia.com/advisories/35340 35685 http://secunia.com/advisories/35685 37023 http://secunia.com/advisories/37023 37028 http://secunia.com/advisories/37028 37037 http://secunia.com/advisories/37037 37043 http://secunia.com/advisories/37043 37077 http://secunia.com/advisories/37077 37079 http://secunia.com/advisories/37079 ADV-2009-1488 http://www.vupen.com/english/advisories/2009/1488 ADV-2009-2928 http://www.vupen.com/english/advisories/2009/2928 MDVSA-2009:334 http://www.mandriva.com/security/advisories?name=MDVSA-2009:334 RHSA-2009:1083 http://www.redhat.com/support/errata/RHSA-2009-1083.html RHSA-2009:1500 https://rhn.redhat.com/errata/RHSA-2009-1500.html RHSA-2009:1501 https://rhn.redhat.com/errata/RHSA-2009-1501.html RHSA-2009:1502 https://rhn.redhat.com/errata/RHSA-2009-1502.html RHSA-2009:1503 https://rhn.redhat.com/errata/RHSA-2009-1503.html RHSA-2009:1512 https://rhn.redhat.com/errata/RHSA-2009-1512.html SUSE-SR:2009:012 http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html cups-pdftops-filter-bo(50941) https://exchange.xforce.ibmcloud.com/vulnerabilities/50941 https://bugzilla.redhat.com/show_bug.cgi?id=491840 oval:org.mitre.oval:def:10534 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10534 Common Vulnerability Exposure (CVE) ID: CVE-2009-0949 http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html BugTraq ID: 35169 http://www.securityfocus.com/bid/35169 Bugtraq: 20090602 CORE-2009-0420 - Apple CUPS IPP_TAG_UNSUPPORTED Handling null pointer Vulnerability (Google Search) http://www.securityfocus.com/archive/1/504032/100/0/threaded Debian Security Information: DSA-1811 (Google Search) http://www.debian.org/security/2009/dsa-1811 http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631 http://www.redhat.com/support/errata/RHSA-2009-1082.html http://securitytracker.com/id?1022321 http://secunia.com/advisories/35322 http://secunia.com/advisories/35328 http://secunia.com/advisories/35342 http://secunia.com/advisories/36701 SuSE Security Announcement: SUSE-SR:2009:012 (Google Search) http://www.ubuntu.com/usn/USN-780-1 XForce ISS Database: apple-cups-ipptag-dos(50926) https://exchange.xforce.ibmcloud.com/vulnerabilities/50926 Common Vulnerability Exposure (CVE) ID: CVE-2009-1196 1022327 http://securitytracker.com/id?1022327 35194 http://www.securityfocus.com/bid/35194 cups-directory-services-dos(50944) https://exchange.xforce.ibmcloud.com/vulnerabilities/50944 https://bugzilla.redhat.com/show_bug.cgi?id=497135 oval:org.mitre.oval:def:11217 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11217 |
Copyright | Copyright (C) 2009 E-Soft Inc. |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |