CUPS cups/ipp.c ippReadIO Function IPP Tag Handling Overflow

Critical Nessus Plugin ID 27608

Synopsis

The remote printer service is prone to a buffer overflow attack.

Description

According to its banner, the version of CUPS installed on the remote host fails to check the text-length field in the 'ippReadIO()' function in 'cups/ipp.c'. Using a specially crafted request with an IPP (Internet Printing Protocol) tag such as 'textWithLanguage' or 'nameWithLanguage' and an overly large text-length value, a remote attacker may be able to leverage this issue to execute arbitrary code on the affected system.

Solution

Upgrade to CUPS version 1.3.4 or later.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2007-76/advisory/

https://www.securityfocus.com/archive/1/483033/30/0/threaded

http://www.cups.org/str.php?L2561

http://www.cups.org/articles.php?L508

Plugin Details

Severity: Critical

ID: 27608

File Name: cups_ipp_tag_overflow.nasl

Version: 1.18

Type: remote

Family: Misc.

Published: 2007/11/02

Updated: 2018/11/15

Dependencies: 10107

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:cups

Required KB Items: www/cups, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2007-4351

BID: 26268

CWE: 189