Scientific Linux Security Update : cups on SL5.x i386/x86_64

High Nessus Plugin ID 60881


The remote Scientific Linux host is missing one or more security updates.


A use-after-free flaw was found in the way the CUPS server parsed Internet Printing Protocol (IPP) packets. A malicious user able to send IPP requests to the CUPS server could use this flaw to crash the CUPS server or, potentially, execute arbitrary code with the privileges of the CUPS server. (CVE-2010-2941)

A possible privilege escalation flaw was found in CUPS. An unprivileged process running as the 'lp' user (such as a compromised external filter program spawned by the CUPS server) could trick the CUPS server into overwriting arbitrary files as the root user.

After installing this update, the cupsd daemon will be restarted automatically.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 60881

File Name: sl_20101028_cups_on_SL5_x.nasl

Version: $Revision: 1.2 $

Type: local

Agent: unix

Published: 2012/08/01

Modified: 2012/10/03

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.9

Vector: CVSS2#AV:A/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2010/10/28

Reference Information

CVE: CVE-2010-2431, CVE-2010-2941