CUPS < 1.3.5 Back End SNMP Response Remote Overflow

Medium Nessus Network Monitor Plugin ID 4320


The remote host is vulnerable to a buffer overflow.


The remote host is running the Common Unix Printing System (CUPS) daemon. This version of CUPS is vulnerable to a remote buffer overflow. The flaw is in the way that CUPS handles SNMP responses. An attacker sending a malformed SNMP response would be able to execute arbitrary code on the remote system. In order to exploit this flaw, the attacker would need for SNMP to be enabled on the CUPS server as well as the ability to intercept and respond to SNMP messages bound for valid hosts.


Upgrade to a version 1.3.5 or higher

See Also

Plugin Details

Severity: Medium

ID: 4320

Family: Web Servers

Published: 2007/12/18

Updated: 2019/03/06

Dependencies: 1442

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 6.3

Temporal Score: 5.5

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:easy_software_products:cups

Reference Information

CVE: CVE-2007-5849

BID: 26917