This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200711-16
(CUPS: Memory corruption)
Alin Rad Pop (Secunia Research) discovered an off-by-one error in the
ippReadIO() function when handling Internet Printing Protocol (IPP)
tags that might allow to overwrite one byte on the stack.
A local attacker could send a specially crafted IPP request containing
'textWithLanguage' or 'nameWithLanguage' tags, leading to a Denial of
Service or the execution of arbitrary code with the privileges of the
'lp' user. If CUPS is configured to allow network printing, this
vulnerability might be remotely exploitable.
To avoid remote exploitation, network access to CUPS servers on port
631/udp should be restricted. In order to do this, update the 'Listen'
setting in cupsd.conf to 'Listen localhost:631' or add a rule to
the system's firewall. However, this will not avoid local users from
exploiting this vulnerability.
See also :
All CUPS users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=net-print/cups-1.2.12-r2'
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Gentoo Local Security Checks
Nessus Plugin ID: 28199 (gentoo_GLSA-200711-16.nasl)
CVE ID: CVE-2007-4351
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.