SynopsisThe remote printer service is affected by multiple vulnerabilities.
DescriptionAccording to its banner, the version of CUPS installed on the remote host is earlier than 1.4.3. Such versions are affected by several vulnerabilities :
- A pointer use-after-free vulnerability exists in the abstract file descriptor handling code in the 'cupsdDoSelect' function in scheduler/select.c. A remote attacker may be able to leverage this to hang or crash the cupsd daemon by disconnecting while receiving a listing with a large number of print jobs. (STR #3200)
- The lppasswd utility, when its setuid bit is enabled, allowing a local user to elevaate privileges because it uses an environment variable to override CUPS' default directories and determine the location of a file with localized message strings. (STR #3482)
SolutionUpgrade to CUPS version 1.4.3 or later.