How to Buy
This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated cups packages that fix a security issue are now available.
This update has been rated as having important security impact by the
Red Hat Security Response Team.
The Common UNIX Printing System (CUPS) is a print spooler.
During a source code audit, Chris Evans discovered a number of integer
overflow bugs that affect Xpdf. CUPS contained a copy of the Xpdf code
used for parsing PDF files and was therefore affected by these bugs.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
assigned the name CVE-2004-0888 to this issue, and Red Hat released
erratum RHSA-2004:543 with updated packages.
It was found that the patch used to correct this issue was not
sufficient and did not fully protect CUPS running on 64-bit
architectures. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2005-0206 to this issue.
These updated packages also include a fix that prevents the CUPS
initscript from being accidentally replaced.
All users of CUPS on 64-bit architectures should upgrade to these
updated packages, which contain a corrected patch and are not
vulnerable to these issues.
See also :
Update the affected cups, cups-devel and / or cups-libs packages.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 17149 ()
CVE ID: CVE-2005-0206
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.