Mandrake Linux Security Advisory : cups (MDKSA-2003:001)

This script is Copyright (C) 2004-2013 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing one or more security
updates.

Description :

iDefense reported several security problems in CUPS that can lead to
local and remote root compromise. An integer overflow in the HTTP
interface can be used to gain remote access with CUPS privilege. A
local file race condition can be used to gain root privilege, although
the previous bug must be exploited first. An attacker can remotely add
printers to the vulnerable system. A remote DoS can be accomplished
due to negative length in the memcpy() call. An integer overflow in
image handling code can be used to gain higher privilege. An attacker
can gain local root privilege due to a buffer overflow of the
'options' buffer. A design problem can be exploited to gain local root
access, however this needs an added printer (which can also be done,
as per a previously noted bug). Wrong handling of zero-width images
can be abused to gain higher privilege. Finally, a file descriptor
leak and DoS due to missing checks of return values of file/socket
operations.

MandrakeSoft recommends all users upgrade these CUPS packages
immediately.

See also :

http://www.idefense.com/advisory/12.23.02.txt

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: Mandriva Local Security Checks

Nessus Plugin ID: 13986 (mandrake_MDKSA-2003-001.nasl)

Bugtraq ID:

CVE ID: CVE-2002-1366
CVE-2002-1367
CVE-2002-1368
CVE-2002-1369
CVE-2002-1371
CVE-2002-1372
CVE-2002-1383
CVE-2002-1384

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now