FreeBSD : cups -- off-by-one buffer overflow (8dd9722c-8e97-11dc-b8f6-001c2514716c)

critical Nessus Plugin ID 27845

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Secunia reports :

Secunia Research has discovered a vulnerability in CUPS, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the 'ippReadIO()' function in cups/ipp.c when processing IPP (Internet Printing Protocol) tags. This can be exploited to overwrite one byte on the stack with a zero by sending an IPP request containing specially crafted 'textWithLanguage' or 'nameWithLanguage' tags.

Successful exploitation allows execution of arbitrary code.

Solution

Update the affected package.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2007-76/

http://www.nessus.org/u?229b5fa5

Plugin Details

Severity: Critical

ID: 27845

File Name: freebsd_pkg_8dd9722c8e9711dcb8f6001c2514716c.nasl

Version: 1.15

Type: local

Published: 11/9/2007

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:cups-base, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 11/9/2007

Vulnerability Publication Date: 11/6/2007

Reference Information

CVE: CVE-2007-4351

CWE: 189