This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.
The remote printer service is prone to a buffer overflow attack.
According to its banner, the version of CUPS installed on the remote
host fails to check the text-length field in the 'ippReadIO()'
function in 'cups/ipp.c'. Using a specially crafted request with an
IPP (Internet Printing Protocol) tag such as 'textWithLanguage' or
'nameWithLanguage' and an overly large text-length value, a remote
attacker may be able to leverage this issue to execute arbitrary code
on the affected system.
See also :
Upgrade to CUPS version 1.3.4 or later.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.4
Public Exploit Available : false