Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 232-1 (cupsys)

Information

Severity

Severity

Critical

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to cupsys announced via advisory DSA 232-1.

Insight

Insight

Multiple vulnerabilities were discovered in the Common Unix Printing System (CUPS). Several of these issues represent the potential for a remote compromise or denial of service. The Common Vulnerabilities and Exposures project identifies the following problems: . CVE-2002-1383: Multiple integer overflows allow a remote attacker to execute arbitrary code via the CUPSd HTTP interface and the image handling code in CUPS filters. . CVE-2002-1366: Race conditions in connection with /etc/cups/certs/ allow local users with lp privileges to create or overwrite arbitrary files. This is not present in the potato version. . CVE-2002-1367: This vulnerabilities allows a remote attacker to add printers without authentication via a certain UDP packet, which can then be used to perform unauthorized activities such as stealing the local root certificate for the administration server via a 'need authorization' page. . CVE-2002-1368: Negative lengths fed into memcpy() can cause a denial of service and possibly execute arbitrary code. . CVE-2002-1369: An unsafe strncat() function call processing the options string allows a remote attacker to execute arbitrary code via a buffer overflow. . CVE-2002-1371: Zero width images allows a remote attacker to execute arbitrary code via modified chunk headers. . CVE-2002-1372: CUPS does not properly check the return values of various file and socket operations, which could allow a remote attacker to cause a denial of service. . CVE-2002-1384: The cupsys package contains some code from the xpdf package, used to convert PDF files for printing, which contains an exploitable integer overflow bug. This is not present in the potato version. Even though we tried very hard to fix all problems in the packages for potato as well, the packages may still contain other security related problems. Hence, we advise users of potato systems using CUPS to upgrade to woody soon. For the current stable distribution (woody), these problems have been fixed in version 1.1.14-4.3. For the old stable distribution (potato), these problems have been fixed in version 1.0.4-12.1. For the unstable distribution (sid), these problems have been fixed in version 1.1.18-1. We recommend that you upgrade your CUPS packages immediately.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20232-1