Ubuntu Security Notice (C) 2010-2013 Canonical, Inc. / NASL script (C) 2010-2013 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related patches.
Adrian Pastor and Tim Starling discovered that the CUPS web interface
incorrectly protected against cross-site request forgery (CSRF)
attacks. If an authenticated user were tricked into visiting a
malicious website while logged into CUPS, a remote attacker could
modify the CUPS configuration and possibly steal confidential data.
It was discovered that CUPS did not properly handle memory allocations
in the texttops filter. If a user or automated system were tricked
into printing a crafted text file, a remote attacker could cause a
denial of service or possibly execute arbitrary code with privileges
of the CUPS user (lp). (CVE-2010-0542)
Luca Carettoni discovered that the CUPS web interface incorrectly
handled form variables. A remote attacker who had access to the CUPS
web interface could use this flaw to read a limited amount of memory
from the cupsd process and possibly obtain confidential data.
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.6
Public Exploit Available : true