This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.
The remote printer service is affected by a buffer overflow
According to its banner, the version of CUPS installed on the remote
host contains a stack-based integer overflow in 'asn1_get_string' in
'backend/snmp.c'. Provided the SNMP backend is configured in CUPS
(true by default in CUPS 1.2 but not 1.3), an attacker may be able to
exploit this issue by using specially crafted SNMP responses with
negative lengths to overflow a buffer and execute arbitrary code on
the affected system.
See also :
Upgrade to CUPS version 1.3.5 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false
Nessus Plugin ID: 29727 (cups_1_3_5.nasl)
Bugtraq ID: 26917
CVE ID: CVE-2007-5849
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.