CUPS < 1.3.10 Multiple Overflows

High Nessus Network Monitor Plugin ID 4771


The remote host is vulnerable to an integer overflow.


According to its banner, the version of CUPS installed on the remote host is earlier than 1.3.10. Such versions are affected by multiple integer overflow vulnerabilities :

- A potential integer overflow in the PNG image validation code in '_cupsImageReadPNG()'. (STR #2974)

- A heap-based integer overflow in '_cupsImageReadTIFF()'. (STR #3031)

- The web interface may be vulnerable to DNS rebinding attacks due to a failure to validate the HTTP Host header in incoming requests. (STR #3118)

- A heap-based buffer overflow in pdftops. (CVE-2009-0195)

- Flawed 'ip' structure initialization in the function 'ippReadIO()' could allow an attacker to crash the application.


Upgrade to version 1.3.10 or higher.

See Also

Plugin Details

Severity: High

ID: 4771

File Name: 4771.prm

Family: Web Servers

Published: 2008/12/01

Modified: 2016/01/15

Dependencies: 1442

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C


Base Score: 7.3

Temporal Score: 6.8


Temporal Vector: CVSS3#E:F/RL:O/RC:C

Exploitable With

Core Impact

Reference Information

CVE: CVE-2008-5286, CVE-2009-0164, CVE-2009-0163, CVE-2009-0949, CVE-2009-0195

BID: 34571, 34665, 34791, 35169, 32518

OSVDB: 50494, 54461, 54462, 54490, 54491, 55002