CUPS < 1.3.5 Back End SNMP Response Remote Overflow

medium Nessus Network Monitor Plugin ID 4320

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running the Common Unix Printing System (CUPS) daemon. This version of CUPS is vulnerable to a remote buffer overflow. The flaw is in the way that CUPS handles SNMP responses. An attacker sending a malformed SNMP response would be able to execute arbitrary code on the remote system. In order to exploit this flaw, the attacker would need for SNMP to be enabled on the CUPS server as well as the ability to intercept and respond to SNMP messages bound for valid hosts.

Solution

Upgrade to a version 1.3.5 or higher

See Also

http://www.cups.org/str.php?L2589

Plugin Details

Severity: Medium

ID: 4320

Family: Web Servers

Published: 12/18/2007

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.5

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:easy_software_products:cups

Reference Information

CVE: CVE-2007-5849

BID: 26917