Fedora 9 : cups-1.3.10-1.fc9 (2009-3753)

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

This update fixes several security issues: CVE-2009-0163,
CVE-2009-0164, CVE-2009-0146, CVE-2009-0147, and CVE-2009-0166. PDF
files are now converted to PostScript using the poppler package's
'pdftops' program. NOTE: If your CUPS server is accessed using a
hostname or hostnames not known to the server itself you must add
'ServerAlias hostname' to cupsd.conf for each such name. The special
line 'ServerAlias *' disables checking (but this allows DNS rebinding
attacks).

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

https://bugzilla.redhat.com/show_bug.cgi?id=490596
https://bugzilla.redhat.com/show_bug.cgi?id=490597
https://bugzilla.redhat.com/show_bug.cgi?id=490612
https://bugzilla.redhat.com/show_bug.cgi?id=490614
https://bugzilla.redhat.com/show_bug.cgi?id=490625
http://www.nessus.org/u?d105b8c1

Solution :

Update the affected cups package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Fedora Local Security Checks

Nessus Plugin ID: 36209 (fedora_2009-3753.nasl)

Bugtraq ID: 34568
34571

CVE ID: CVE-2009-0146
CVE-2009-0147
CVE-2009-0163
CVE-2009-0164
CVE-2009-0166

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now