Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

CUPS < 1.3.5 Back End SNMP Response Remote Overflow

Medium

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running the Common Unix Printing System (CUPS) daemon. This version of CUPS is vulnerable to a remote buffer overflow. The flaw is in the way that CUPS handles SNMP responses. An attacker sending a malformed SNMP response would be able to execute arbitrary code on the remote system. In order to exploit this flaw, the attacker would need for SNMP to be enabled on the CUPS server as well as the ability to intercept and respond to SNMP messages bound for valid hosts.

Solution

Upgrade to a version 1.3.5 or higher