Scientific Linux Security Update : cups on SL3.x, SL4.x, SL5.x i386/x86_64

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

SL5 Only: A heap buffer overflow flaw was found in a CUPS
administration interface CGI script. A local attacker able to connect
to the IPP port (TCP port 631) could send a malicious request causing
the script to crash or, potentially, execute arbitrary code as the
'lp' user. Please note: the default CUPS configuration in Red Hat
Enterprise Linux 5 does not allow remote connections to the IPP TCP
port. (CVE-2008-0047)

Two overflows were discovered in the HP-GL/2-to-PostScript filter. An
attacker could create a malicious HP-GL/2 file that could possibly
execute arbitrary code as the 'lp' user if the file is printed.
(CVE-2008-0053)

A buffer overflow flaw was discovered in the GIF decoding routines
used by CUPS image converting filters 'imagetops' and 'imagetoraster'.
An attacker could create a malicious GIF file that could possibly
execute arbitrary code as the 'lp' user if the file was printed.
(CVE-2008-1373)

SL 3 &amp
4 Only: It was discovered that the patch used to address
CVE-2004-0888 in CUPS packages in Scientific Linux 3 and 4 did not
completely resolve the integer overflow in the 'pdftops' filter on
64-bit platforms. An attacker could create a malicious PDF file that
could possibly execute arbitrary code as the 'lp' user if the file was
printed. (CVE-2008-1374)

See also :

http://www.nessus.org/u?b76553d2

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60378 ()

Bugtraq ID:

CVE ID: CVE-2004-0888
CVE-2008-0047
CVE-2008-0053
CVE-2008-1373
CVE-2008-1374