SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   CUPS Vendors:   Easy Software Products
(Caldera Issues Fix for OpenLinux) Re: Common UNIX Printing System (CUPS) Buffer Overflow May Allow a Remote User to Execute Arbitrary Code or Crash the Process
SecurityTracker Alert ID:  1003926
SecurityTracker URL:  http://securitytracker.com/id/1003926
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Mar 29 2002
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 1.1.14
Description:   A buffer overflow has been reported in the Common UNIX Printing System (CUPS). A remote user may be able to execute arbitrary code on the system.

It is reported that there are two buffer overflow bugs in the code that implements the Internet Printing Protocol ("IPP") processing of the names of attributes.

A remote user may be able to execute arbitrary code on the CUPS host or cause the process to crash.

No further details were provided.

Impact:   A remote user may be able to execute arbitrary code on the CUPS host with the privileges of the CUPS process or to cause the process to crash.
Solution:   The vendor has issued a fix.

For OpenLinux 3.1 Server:

The 3.1 version of this package is not yet available. An updated advisory will be published when the package is released.


For OpenLinux 3.1 Workstation:

The 3.1 version of this package is not yet available. An updated advisory will be published when the package is released.


For OpenLinux 3.1.1 Server:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS

The corresponding source code package can be found at:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS

The verification checksums are:

54c460f1858c9ae1d3c4057812825cbd RPMS/cups-1.1.10-5.i386.rpm
1caf530d29b5387d2da32e2bc31340c7 RPMS/cups-client-1.1.10-5.i386.rpm
45b44112561c92cfbb7e8bd11840697e RPMS/cups-devel-1.1.10-5.i386.rpm
13cbec00ffd614f696f905c35ed63b7b RPMS/cups-ppd-1.1.10-5.i386.rpm
556f0a1bd6ff629a32c9812d5a31ced1 SRPMS/cups-1.1.10-5.src.rpm

Upgrade the affected packages with the following commands:

rpm -Fvh cups-1.1.10-5.i386.rpm \
cups-client-1.1.10-5.i386.rpm \
cups-devel-1.1.10-5.i386.rpm cups-ppd-1.1.10-5.i386.rpm


For OpenLinux 3.1.1 Workstation:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS

The corresponding source code package can be found at:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS

The verification checksums are:

54c460f1858c9ae1d3c4057812825cbd RPMS/cups-1.1.10-5.i386.rpm
1caf530d29b5387d2da32e2bc31340c7 RPMS/cups-client-1.1.10-5.i386.rpm
45b44112561c92cfbb7e8bd11840697e RPMS/cups-devel-1.1.10-5.i386.rpm
13cbec00ffd614f696f905c35ed63b7b RPMS/cups-ppd-1.1.10-5.i386.rpm
556f0a1bd6ff629a32c9812d5a31ced1 SRPMS/cups-1.1.10-5.src.rpm

Upgrade the affected packages with the following commands:

rpm -Fvh cups-1.1.10-5.i386.rpm \
cups-client-1.1.10-5.i386.rpm \
cups-devel-1.1.10-5.i386.rpm cups-ppd-1.1.10-5.i386.rpm

Vendor URL:  www.cups.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Caldera/SCO)

Message History:   This archive entry is a follow-up to the message listed below.
Feb 14 2002 Common UNIX Printing System (CUPS) Buffer Overflow May Allow a Remote User to Execute Arbitrary Code or Crash the Process



 Source Message Contents

Subject:  Security Update: [CSSA-2002-008.0] Linux: CUPS buffer overflow when reading names of attributes


--oyUTqETQ0mS9luUI
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: 8bit            

To: bugtraq@securityfocus.com announce@lists.caldera.com security-alerts@linuxsecurity.com

______________________________________________________________________________
		   Caldera International, Inc.  Security Advisory

Subject:		Linux: CUPS buffer overflow when reading names of attributes
Advisory number: 	CSSA-2002-008.0
Issue date: 		2002, March 14
Cross reference:
______________________________________________________________________________


1. Problem Description

   The authors of CUPS, the Common UNIX Printing System, have found a
   potential buffer overflow bug in the code of the CUPS daemon where it
   reads the names of attributes.


2. Vulnerable Supported Versions

   System                       Package
   -----------------------------------------------------------
   OpenLinux Server 3.1          All packages previous to
                                 cups-1.1.10-5   

   OpenLinux Workstation 3.1     All packages previous to
                                 cups-1.1.10-5                 

   OpenLinux Server 3.1.1        All packages previous to
                                 cups-1.1.10-5                 
   
   OpenLinux Workstation         All packages previous to      
   3.1.1                         cups-1.1.10-5                 
   


3. Solution

   Workaround

     none

   The proper solution is to upgrade to the latest packages.


4. OpenLinux 3.1 Server

    4.1 Location of Fixed Packages

         The 3.1 version of this package is not yet available. An updated
         advisory will be published when the package is released.
 

5. OpenLinux 3.1 Workstation

    5.1 Location of Fixed Packages

         The 3.1 version of this package is not yet available. An updated
         advisory will be published when the package is released.
 

6. OpenLinux 3.1.1 Server

    6.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Server/current/SRPMS

   6.2 Verification

       54c460f1858c9ae1d3c4057812825cbd  RPMS/cups-1.1.10-5.i386.rpm
       1caf530d29b5387d2da32e2bc31340c7  RPMS/cups-client-1.1.10-5.i386.rpm
       45b44112561c92cfbb7e8bd11840697e  RPMS/cups-devel-1.1.10-5.i386.rpm
       13cbec00ffd614f696f905c35ed63b7b  RPMS/cups-ppd-1.1.10-5.i386.rpm
       556f0a1bd6ff629a32c9812d5a31ced1  SRPMS/cups-1.1.10-5.src.rpm
       

   6.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh cups-1.1.10-5.i386.rpm \
              cups-client-1.1.10-5.i386.rpm \
              cups-devel-1.1.10-5.i386.rpm cups-ppd-1.1.10-5.i386.rpm
         

7. OpenLinux 3.1.1 Workstation

    7.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1.1/Workstation/current/SRPMS

   7.2 Verification

       54c460f1858c9ae1d3c4057812825cbd  RPMS/cups-1.1.10-5.i386.rpm
       1caf530d29b5387d2da32e2bc31340c7  RPMS/cups-client-1.1.10-5.i386.rpm
       45b44112561c92cfbb7e8bd11840697e  RPMS/cups-devel-1.1.10-5.i386.rpm
       13cbec00ffd614f696f905c35ed63b7b  RPMS/cups-ppd-1.1.10-5.i386.rpm
       556f0a1bd6ff629a32c9812d5a31ced1  SRPMS/cups-1.1.10-5.src.rpm
       

   7.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh cups-1.1.10-5.i386.rpm \
              cups-client-1.1.10-5.i386.rpm \
              cups-devel-1.1.10-5.i386.rpm cups-ppd-1.1.10-5.i386.rpm
         


8. References

   Specific references for this advisory:

	none


   Caldera OpenLinux security resources:

	http://www.caldera.com/support/security/index.html

   Caldera UNIX security resources:

	http://stage.caldera.com/support/security/



   This security fix closes Caldera incidents sr860818, fz520280,
   erg711981.


9. Disclaimer

   Caldera International, Inc. is not responsible for the misuse of
   any of the information we provide on this website and/or through
   our security advisories.  Our advisories are a service to our
   customers intended to promote secure installation and use of
   Caldera International products.

______________________________________________________________________________

--oyUTqETQ0mS9luUI
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAjyktyAACgkQbluZssSXDTEQiACg7Olsb741OyvFNdU0DmYVBXCs
hyQAoLLXujlUVL46OlvP5UxyLxm1YMPI
=S04H
-----END PGP SIGNATURE-----

--oyUTqETQ0mS9luUI--

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC