Debian DSA-1407-1 : cupsys - buffer overflow

critical Nessus Plugin ID 28253

Synopsis

The remote Debian host is missing a security-related update.

Description

Alin Rad Pop discovered that the Common UNIX Printing System is vulnerable to an off-by-one buffer overflow in the code to process IPP packets, which may lead to the execution of arbitrary code.

The cupsys version in the old stable distribution (sarge) is not vulnerable to arbitrary code execution.

Solution

Upgrade the cupsys packages.

For the stable distribution (etch), this problem has been fixed in version 1.2.7-4etch1. Updated packages for the arm architecture will be provided later.

See Also

https://www.debian.org/security/2007/dsa-1407

Plugin Details

Severity: Critical

ID: 28253

File Name: debian_DSA-1407.nasl

Version: 1.15

Type: local

Agent: unix

Published: 11/20/2007

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:cupsys, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 11/18/2007

Reference Information

CVE: CVE-2007-4351

CWE: 189

DSA: 1407