Scientific Linux Security Update : cups-filters on SL7.x x86_64

This script is Copyright (C) 2015 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

A heap-based buffer overflow flaw and an integer overflow flaw leading
to a heap-based buffer overflow were discovered in the way the
texttopdf utility of cups-filter processed print jobs with a specially
crafted line size. An attacker able to submit print jobs could use
these flaws to crash texttopdf or, possibly, execute arbitrary code
with the privileges of the 'lp' user. (CVE-2015-3258, CVE-2015-3279)

Notably, this update also fixes the following bug :

- Previously, when polling CUPS printers from a CUPS
server, when a printer name contained an underscore (_),
the client displayed the name containing a hyphen (-)
instead. This made the print queue unavailable. With
this update, CUPS allows the underscore character in
printer names, and printers appear as shown on the CUPS
server as expected.

In addition, this update adds the following enhancement :

- Now, the information from local and remote CUPS servers
is cached during each poll, and the CUPS server load is
reduced.

See also :

http://www.nessus.org/u?3e9e6380

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 87553 ()

Bugtraq ID:

CVE ID: CVE-2015-3258
CVE-2015-3279

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now