CUPS < 1.4.3 Multiple Vulnerabilities

Medium Nessus Network Monitor Plugin ID 5512

Synopsis

The remote host is running a web application that is affected by multiple attack vectors.

Description

According to its banner, the version of CUPS installed on the remote host is earlier than 1.4.3. Such versions are affected by several vulnerabilities :

- A pointer use-after-free vulnerability exists in the abstract file descriptor handling code in the 'cupsdDoSelect' function in scheduler/select.c. A remote attacker may be able to leverage this to hang or crash the cupsd daemon by disconnecting while receiving a listing with a large number of print jobs. (STR #3200)

- The lppasswd utility, when its setuid bit is enabled, allows a local user to escalate his or her privileges because it uses an environment variable to override CUPS' default directories and determine the location of a file with localized message strings. (STR #3482)

Solution

Upgrade to CUPS version 1.4.3 or later.

See Also

http://www.cups.org/str.php?L3200

http://www.cups.org/str.php?L3482

http://www.cups.org/articles.php?L594

Plugin Details

Severity: Medium

ID: 5512

File Name: 5512.prm

Family: Web Servers

Published: 2010/04/19

Modified: 2016/01/22

Dependencies: 1442

Nessus ID: 45554

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6

Temporal Score: 5

Vector: CVSS2#AV:L/AC:H/Au:S/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

CVSSv3

Base Score: 7

Temporal Score: 6.5

Vector: CVSS3#AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 2010/03/30

Vulnerability Publication Date: 2010/03/03

Exploitable With

Core Impact

Reference Information

CVE: CVE-2009-3553, CVE-2010-0393

BID: 37048, 38524