Mandriva Linux Security Advisory : cups (MDVSA-2008:211)

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

A buffer overflow in the SGI image format decoding routines used by
the CUPS image converting filter imagetops was discovered. An attacker
could create malicious SGI image files that could possibly execute
arbitrary code if the file was printed (CVE-2008-3639).

An integer overflow flaw leading to a heap buffer overflow was found
in the Text-to-PostScript texttops filter. An attacker could create a
malicious text file that could possibly execute arbitrary code if the
file was printed (CVE-2008-3640).

Finally, an insufficient buffer bounds checking flaw was found in the
HP-GL/2-to-PostScript hpgltops filter. An attacker could create a
malicious HP-GL/2 file that could possibly execute arbitrary code if
the file was printed (CVE-2008-3641).

The updated packages have been patched to prevent this issue; for
Mandriva Linux 2009.0 the latest CUPS version (1.3.9) is provided that
corrects these issues and also provides other bug fixes.

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 36840 (mandriva_MDVSA-2008-211.nasl)

Bugtraq ID: 31688
31690

CVE ID: CVE-2008-3639
CVE-2008-3640
CVE-2008-3641
CVE-2009-0577

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now