CUPS < 1.3.5 Back End SNMP Response Remote Overflow
Medium Nessus Network Monitor Plugin ID 4320
SynopsisThe remote host is vulnerable to a buffer overflow.
DescriptionThe remote host is running the Common Unix Printing System (CUPS) daemon. This version of CUPS is vulnerable to a remote buffer overflow. The flaw is in the way that CUPS handles SNMP responses. An attacker sending a malformed SNMP response would be able to execute arbitrary code on the remote system. In order to exploit this flaw, the attacker would need for SNMP to be enabled on the CUPS server as well as the ability to intercept and respond to SNMP messages bound for valid hosts.
SolutionUpgrade to a version 1.3.5 or higher