GLSA-200804-01 : CUPS: Multiple vulnerabilities

Critical Nessus Plugin ID 31752

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.7


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-200804-01 (CUPS: Multiple vulnerabilities)

Multiple vulnerabilities have been reported in CUPS:
regenrecht (VeriSign iDefense) discovered that the cgiCompileSearch() function used in several CGI scripts in CUPS' administration interface does not correctly calculate boundaries when processing a user-provided regular expression, leading to a heap-based buffer overflow (CVE-2008-0047).
Helge Blischke reported a double free() vulnerability in the process_browse_data() function when adding or removing remote shared printers (CVE-2008-0882).
Tomas Hoger (Red Hat) reported that the gif_read_lzw() function uses the code_size value from GIF images without properly checking it, leading to a buffer overflow (CVE-2008-1373).
An unspecified input validation error was discovered in the HP-GL/2 filter (CVE-2008-0053).
Impact :

A local attacker could send specially crafted network packets or print jobs and possibly execute arbitrary code with the privileges of the user running CUPS (usually lp), or cause a Denial of Service. The vulnerabilities are exploitable via the network when CUPS is sharing printers remotely.
Workaround :

There is no known workaround at this time.


All CUPS users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-print/cups-1.2.12-r7'

See Also

Plugin Details

Severity: Critical

ID: 31752

File Name: gentoo_GLSA-200804-01.nasl

Version: 1.17

Type: local

Published: 2008/04/04

Updated: 2021/01/06

Dependencies: 12634

Risk Information

Risk Factor: Critical

VPR Score: 6.7

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:cups, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2008/04/01

Reference Information

CVE: CVE-2008-0047, CVE-2008-0053, CVE-2008-0882, CVE-2008-1373

BID: 27906, 28307, 28334, 28544

GLSA: 200804-01

CWE: 119