CUPS < 1.3.10 Multiple Overflows

High Nessus Network Monitor Plugin ID 4771

Synopsis

The remote host is vulnerable to an integer overflow.

Description

According to its banner, the version of CUPS installed on the remote host is earlier than 1.3.10. Such versions are affected by multiple integer overflow vulnerabilities :

- A potential integer overflow in the PNG image validation code in '_cupsImageReadPNG()'. (STR #2974)

- A heap-based integer overflow in '_cupsImageReadTIFF()'. (STR #3031)

- The web interface may be vulnerable to DNS rebinding attacks due to a failure to validate the HTTP Host header in incoming requests. (STR #3118)

- A heap-based buffer overflow in pdftops. (CVE-2009-0195)

- Flawed 'ip' structure initialization in the function 'ippReadIO()' could allow an attacker to crash the application.

Solution

Upgrade to version 1.3.10 or higher.

See Also

http://www.cups.org/str.php?L2974

Plugin Details

Severity: High

ID: 4771

File Name: 4771.prm

Family: Web Servers

Published: 2008/12/01

Modified: 2016/01/15

Dependencies: 1442

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 7.3

Temporal Score: 6.8

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Exploitable With

Core Impact

Reference Information

CVE: CVE-2008-5286, CVE-2009-0164, CVE-2009-0163, CVE-2009-0949, CVE-2009-0195

BID: 34571, 34665, 34791, 35169, 32518

OSVDB: 50494, 54461, 54462, 54490, 54491, 55002