CUPS < 1.3.5 Back End SNMP Response Remote Overflow

Medium Nessus Network Monitor Plugin ID 4320

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running the Common Unix Printing System (CUPS) daemon. This version of CUPS is vulnerable to a remote buffer overflow. The flaw is in the way that CUPS handles SNMP responses. An attacker sending a malformed SNMP response would be able to execute arbitrary code on the remote system. In order to exploit this flaw, the attacker would need for SNMP to be enabled on the CUPS server as well as the ability to intercept and respond to SNMP messages bound for valid hosts.

Solution

Upgrade to a version 1.3.5 or higher

See Also

http://www.cups.org/str.php?L2589

Plugin Details

Severity: Medium

ID: 4320

Family: Web Servers

Published: 2007/12/18

Modified: 2018/09/16

Dependencies: 1442

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 6.3

Temporal Score: 5.5

Vector: CVSS3#AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:easy_software_products:cups

Reference Information

CVE: CVE-2007-5849

BID: 26917