GLSA-200711-16 : CUPS: Memory corruption

Critical Nessus Plugin ID 28199


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-200711-16 (CUPS: Memory corruption)

Alin Rad Pop (Secunia Research) discovered an off-by-one error in the ippReadIO() function when handling Internet Printing Protocol (IPP) tags that might allow to overwrite one byte on the stack.
Impact :

A local attacker could send a specially crafted IPP request containing 'textWithLanguage' or 'nameWithLanguage' tags, leading to a Denial of Service or the execution of arbitrary code with the privileges of the 'lp' user. If CUPS is configured to allow network printing, this vulnerability might be remotely exploitable.
Workaround :

To avoid remote exploitation, network access to CUPS servers on port 631/udp should be restricted. In order to do this, update the 'Listen' setting in cupsd.conf to 'Listen localhost:631' or add a rule to the system's firewall. However, this will not avoid local users from exploiting this vulnerability.


All CUPS users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-print/cups-1.2.12-r2'

See Also

Plugin Details

Severity: Critical

ID: 28199

File Name: gentoo_GLSA-200711-16.nasl

Version: 1.13

Type: local

Published: 2007/11/14

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:cups, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 2007/11/12

Reference Information

CVE: CVE-2007-4351

GLSA: 200711-16

CWE: 189