FreeBSD : cups -- off-by-one buffer overflow (8dd9722c-8e97-11dc-b8f6-001c2514716c)

This script is Copyright (C) 2007-2013 Tenable Network Security, Inc.

Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Secunia reports :

Secunia Research has discovered a vulnerability in CUPS, which can be
exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the
'ippReadIO()' function in cups/ipp.c when processing IPP (Internet
Printing Protocol) tags. This can be exploited to overwrite one byte
on the stack with a zero by sending an IPP request containing
specially crafted 'textWithLanguage' or 'nameWithLanguage' tags.

Successful exploitation allows execution of arbitrary code.

See also :

Solution :

Update the affected package.

Risk factor :

Critical / CVSS Base Score : 10.0

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 27845 (freebsd_pkg_8dd9722c8e9711dcb8f6001c2514716c.nasl)

Bugtraq ID:

CVE ID: CVE-2007-4351

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now