Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : cups, cupsys vulnerabilities (USN-952-1)

Ubuntu Security Notice (C) 2010-2013 Canonical, Inc. / NASL script (C) 2010-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

Adrian Pastor and Tim Starling discovered that the CUPS web interface
incorrectly protected against cross-site request forgery (CSRF)
attacks. If an authenticated user were tricked into visiting a
malicious website while logged into CUPS, a remote attacker could
modify the CUPS configuration and possibly steal confidential data.
(CVE-2010-0540)

It was discovered that CUPS did not properly handle memory allocations
in the texttops filter. If a user or automated system were tricked
into printing a crafted text file, a remote attacker could cause a
denial of service or possibly execute arbitrary code with privileges
of the CUPS user (lp). (CVE-2010-0542)

Luca Carettoni discovered that the CUPS web interface incorrectly
handled form variables. A remote attacker who had access to the CUPS
web interface could use this flaw to read a limited amount of memory
from the cupsd process and possibly obtain confidential data.
(CVE-2010-1748).

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 47108 ()

Bugtraq ID: 40889
40897
40943

CVE ID: CVE-2010-0540
CVE-2010-0542
CVE-2010-1748