CVE-2009-2820

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The web interface in CUPS before 1.4.2, as used on Apple Mac OS X before 10.6.2 and other platforms, does not properly handle (1) HTTP headers and (2) HTML templates, which allows remote attackers to conduct cross-site scripting (XSS) attacks and HTTP response splitting attacks via vectors related to (a) the product's web interface, (b) the configuration of the print system, and (c) the titles of printed jobs, as demonstrated by an XSS attack that uses the kerberos parameter to the admin program, and leverages attribute injection and HTTP Parameter Pollution (HPP) issues.

References

http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html

http://secunia.com/advisories/37308

http://secunia.com/advisories/37360

http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021115.1-1

http://support.apple.com/kb/HT3937

http://www.cups.org/articles.php?L590

http://www.cups.org/documentation.php/relnotes.html

http://www.cups.org/str.php?L3367

http://www.mandriva.com/security/advisories?name=MDVSA-2010:072

http://www.mandriva.com/security/advisories?name=MDVSA-2010:073

http://www.redhat.com/support/errata/RHSA-2009-1595.html

http://www.securityfocus.com/bid/36956

http://www.vupen.com/english/advisories/2009/3184

https://bugzilla.redhat.com/show_bug.cgi?id=529833

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9153

Details

Source: MITRE

Published: 2009-11-10

Updated: 2017-09-19

Type: CWE-79

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.0.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.1.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:10.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions up to 10.6.1 (inclusive)

Configuration 2

OR

cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.0.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.0.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.0.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.0.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.0.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.1.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:10.6:*:*:*:*:*:*:*

cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* versions up to 10.6.1 (inclusive)

Tenable Plugins

View all (19 total)

IDNameProductFamilySeverity
67961Oracle Linux 5 : cups (ELSA-2009-1595)NessusOracle Linux Local Security Checks
medium
67076CentOS 5 : cups (CESA-2009:1595)NessusCentOS Local Security Checks
medium
45530Mandriva Linux Security Advisory : cups (MDVSA-2010:073-1)NessusMandriva Local Security Checks
medium
44798Debian DSA-1933-1 : cups - missing input sanitisingNessusDebian Local Security Checks
medium
43107openSUSE Security Update : cups (cups-1650)NessusSuSE Local Security Checks
medium
42965Fedora 10 : cups-1.3.11-2.fc10 (2009-11062)NessusFedora Local Security Checks
medium
42936Fedora 12 : cups-1.4.2-7.fc12 (2009-11314)NessusFedora Local Security Checks
medium
42935Fedora 11 : cups-1.4.2-7.fc11 (2009-10891)NessusFedora Local Security Checks
medium
42850RHEL 5 : cups (RHSA-2009:1595)NessusRed Hat Local Security Checks
medium
42473SuSE 11 Security Update : CUPS (SAT Patch Number 1504)NessusSuSE Local Security Checks
medium
42472openSUSE Security Update : cups (cups-1506)NessusSuSE Local Security Checks
medium
42471openSUSE Security Update : cups (cups-1506)NessusSuSE Local Security Checks
medium
5230CUPS < 1.4.2 XSSNessus Network MonitorWeb Servers
medium
42468CUPS < 1.4.2 kerberos Parameter XSSNessusMisc.
medium
42466Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : cups, cupsys vulnerability (USN-856-1)NessusUbuntu Local Security Checks
medium
800795Mac OS X 10.6 < 10.6.2 Multiple VulnerabilitiesLog Correlation EngineOperating System Detection
high
5227Mac OS X 10.6 < 10.6.2 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
42434Mac OS X 10.6.x < 10.6.2 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
42433Mac OS X Multiple Vulnerabilities (Security Update 2009-006)NessusMacOS X Local Security Checks
critical