Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Generic)  >   CUPS Vendors:   Easy Software Products
CUPS HPGL Buffer Overflow in ParseCommand() Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1012566
SecurityTracker URL:
CVE Reference:   CAN-2004-1267   (Links to External Site)
Updated:  Dec 23 2004
Original Entry Date:  Dec 16 2004
Impact:   Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 1.1.22
Description:   A vulnerability was reported in CUPS in the processing of HPGL files. A remote user can cause arbitrary code to be executed by the target user.

D. J. Bernstein reported that a remote user can create a specially crafted HPGL file that, when printed by the target user with CUPS, will execute arbitrary code on the target user's system. The code will run with the privileges of the 'lp' user.

The buffer overflow resides in the ParseCommand() function in 'hpgl-input.c'.

Ariel Berkman is credited with discovering this flaw.

Impact:   A remote user can cause arbitrary code to be executed on the target system with 'lp' user privileges.
Solution:   No solution was available at the time of this entry.
Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jan 13 2005 (Red Hat Issues Fix) CUPS HPGL Buffer Overflow in ParseCommand() Lets Remote Users Execute Arbitrary Code
Red Hat has released a fix.
Jan 18 2005 (Mandrake Issues Fix) CUPS HPGL Buffer Overflow in ParseCommand() Lets Remote Users Execute Arbitrary Code
Mandrake has released a fix.

 Source Message Contents

Date:  15 Dec 2004 08:20:11 -0000
Subject:  [remote] [control] CUPS 1.1.22 hpgltops ParseCommand overflows buf

Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

Ariel Berkman, a student in my Fall 2004 UNIX Security Holes course, has
discovered a remotely exploitable security hole in CUPS. I'm publishing
this notice, but all the discovery credits should be assigned to

A CUPS installation is at risk whenever it prints an HPGL file obtained
from email (or a web page or any other source that could be controlled
by an attacker). You are at risk if you print data through a CUPS
installation at risk. The source of the HPGL file has complete control
over the CUPS ``lp'' account; in particular, he can read and modify the
files you are printing.

Proof of concept: On an x86 computer running FreeBSD 4.10, as root, type

   cd /usr/ports/print/cups
   make install

to download and compile the CUPS package, version 1.1.22 (current).
Then, as any user, save the file 21.hpgl.gz attached to this message,
and type

   gunzip 21.hpgl
   /usr/local/libexec/cups/filter/hpgltops \
   15 $USER test-title 1 none 21.hpgl >

with the unauthorized result that a file named x is removed from the
current directory. (I tested this with a 541-byte environment, as
reported by printenv | wc -c.)

Here's the bug: In hpgl-input.c, ParseCommand() reads any number of
bytes into a 262144-byte buf[] array.

---D. J. Bernstein, Associate Professor, Department of Mathematics,
Statistics, and Computer Science, University of Illinois at Chicago

Content-Type: application/x-gunzip
Content-Disposition: attachment; filename="21.hpgl.gz"
Content-Transfer-Encoding: base64




Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, LLC