FreeBSD : cups -- off-by-one buffer overflow (8dd9722c-8e97-11dc-b8f6-001c2514716c)

Critical Nessus Plugin ID 27845


The remote FreeBSD host is missing a security-related update.


Secunia reports :

Secunia Research has discovered a vulnerability in CUPS, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the 'ippReadIO()' function in cups/ipp.c when processing IPP (Internet Printing Protocol) tags. This can be exploited to overwrite one byte on the stack with a zero by sending an IPP request containing specially crafted 'textWithLanguage' or 'nameWithLanguage' tags.

Successful exploitation allows execution of arbitrary code.


Update the affected package.

See Also

Plugin Details

Severity: Critical

ID: 27845

File Name: freebsd_pkg_8dd9722c8e9711dcb8f6001c2514716c.nasl

Version: $Revision: 1.11 $

Type: local

Published: 2007/11/09

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:cups-base, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2007/11/09

Vulnerability Publication Date: 2007/11/06

Reference Information

CVE: CVE-2007-4351

CWE: 189