CUPS cups/ipp.c ippReadIO Function IPP Tag Handling Overflow

Critical Nessus Plugin ID 27608


The remote printer service is prone to a buffer overflow attack.


According to its banner, the version of CUPS installed on the remote host fails to check the text-length field in the 'ippReadIO()' function in 'cups/ipp.c'. Using a specially crafted request with an IPP (Internet Printing Protocol) tag such as 'textWithLanguage' or 'nameWithLanguage' and an overly large text-length value, a remote attacker may be able to leverage this issue to execute arbitrary code on the affected system.


Upgrade to CUPS version 1.3.4 or later.

See Also

Plugin Details

Severity: Critical

ID: 27608

File Name: cups_ipp_tag_overflow.nasl

Version: 1.18

Type: remote

Family: Misc.

Published: 2007/11/02

Updated: 2018/11/15

Dependencies: 10107

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:cups

Required KB Items: www/cups, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2007-4351

BID: 26268

CWE: 189