CUPS cups/ipp.c ippReadIO Function IPP Tag Handling Overflow

critical Nessus Plugin ID 27608

Synopsis

The remote printer service is prone to a buffer overflow attack.

Description

According to its banner, the version of CUPS installed on the remote host fails to check the text-length field in the 'ippReadIO()' function in 'cups/ipp.c'. Using a specially crafted request with an IPP (Internet Printing Protocol) tag such as 'textWithLanguage' or 'nameWithLanguage' and an overly large text-length value, a remote attacker may be able to leverage this issue to execute arbitrary code on the affected system.

Solution

Upgrade to CUPS version 1.3.4 or later.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2007-76/advisory/

https://www.securityfocus.com/archive/1/483033/30/0/threaded

http://www.cups.org/str.php?L2561

http://www.cups.org/articles.php?L508

Plugin Details

Severity: Critical

ID: 27608

File Name: cups_ipp_tag_overflow.nasl

Version: 1.18

Type: remote

Family: Misc.

Published: 11/2/2007

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:apple:cups

Required KB Items: www/cups, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2007-4351

BID: 26268

CWE: 189