Vulnerabilities > CVE-2002-1384 - Integer Overflow vulnerability in Xpdf/CUPS pdftops
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.
Vulnerable Configurations
Nessus
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2002-307.NASL description Updated Xpdf packages are available to fix a vulnerability where a malicious PDF document could run arbitrary code. [Updated 06 Feb 2003] Added fixed packages for Advanced Workstation 2.1 Xpdf is an X Window System based viewer for Portable Document Format (PDF) files. During an audit of CUPS, a printing system, Zen Parsec found an integer overflow vulnerability in the pdftops filter. Since the code for pdftops is taken from the Xpdf project, all versions of Xpdf including 2.01 are also vulnerable to this issue. An attacker could create a malicious PDF file that would execute arbitrary code as the user who used Xpdf to view it. All users of Xpdf are advised to upgrade to these errata packages which contain a patch to correct this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 12345 published 2004-07-06 reporter This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/12345 title RHEL 2.1 : xpdf (RHSA-2002:307) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2002:307. The text # itself is copyright (C) Red Hat, Inc. # include("compat.inc"); if (description) { script_id(12345); script_version ("1.23"); script_cvs_date("Date: 2019/10/25 13:36:10"); script_cve_id("CVE-2002-1384"); script_xref(name:"RHSA", value:"2002:307"); script_name(english:"RHEL 2.1 : xpdf (RHSA-2002:307)"); script_summary(english:"Checks the rpm output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Red Hat host is missing a security update." ); script_set_attribute( attribute:"description", value: "Updated Xpdf packages are available to fix a vulnerability where a malicious PDF document could run arbitrary code. [Updated 06 Feb 2003] Added fixed packages for Advanced Workstation 2.1 Xpdf is an X Window System based viewer for Portable Document Format (PDF) files. During an audit of CUPS, a printing system, Zen Parsec found an integer overflow vulnerability in the pdftops filter. Since the code for pdftops is taken from the Xpdf project, all versions of Xpdf including 2.01 are also vulnerable to this issue. An attacker could create a malicious PDF file that would execute arbitrary code as the user who used Xpdf to view it. All users of Xpdf are advised to upgrade to these errata packages which contain a patch to correct this issue." ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2002-1384" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2002:307" ); script_set_attribute(attribute:"solution", value:"Update the affected xpdf package."); script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:xpdf"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:2.1"); script_set_attribute(attribute:"vuln_publication_date", value:"2003/01/02"); script_set_attribute(attribute:"patch_publication_date", value:"2003/02/05"); script_set_attribute(attribute:"plugin_publication_date", value:"2004/07/06"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Red Hat Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat"); os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat"); os_ver = os_ver[1]; if (! preg(pattern:"^2\.1([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 2.1", "Red Hat " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu); if (cpu !~ "^i[3-6]86$") audit(AUDIT_ARCH_NOT, "i386", cpu); yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo"); if (!empty_or_null(yum_updateinfo)) { rhsa = "RHSA-2002:307"; yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa); if (!empty_or_null(yum_report)) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : yum_report ); exit(0); } else { audit_message = "affected by Red Hat security advisory " + rhsa; audit(AUDIT_OS_NOT, audit_message); } } else { flag = 0; if (rpm_check(release:"RHEL2.1", cpu:"i386", reference:"xpdf-0.92-8")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : rpm_report_get() + redhat_report_package_caveat() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "xpdf"); } }
NASL family SuSE Local Security Checks NASL id SUSE_SA_2003_002.NASL description The remote host is missing the patch for the advisory SUSE-SA:2003:002 (cups). CUPS is a well known and widely used printing system for unix-like systems. iDFENSE reported several security issues with CUPS that can lead to local and remote root compromise. The following list includes all vulnerabilities: - integer overflow in HTTP interface to gain remote access with CUPS privileges - local file race condition to gain root (bug mentioned above has to be exploited first) - remotely add printers - remote denial-of-service attack due to negative length in memcpy() call - integer overflow in image handling code to gain higher privileges - gain local root due to buffer overflow of last seen 2020-06-01 modified 2020-06-02 plugin id 13780 published 2004-07-25 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/13780 title SUSE-SA:2003:002: cups code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # This plugin text was extracted from SuSE Security Advisory SUSE-SA:2003:002 # if ( ! defined_func("bn_random") ) exit(0); include("compat.inc"); if(description) { script_id(13780); script_bugtraq_id(6475); script_version ("1.15"); script_cve_id("CVE-2002-1366", "CVE-2002-1367", "CVE-2002-1368", "CVE-2002-1369", "CVE-2002-1371", "CVE-2002-1372", "CVE-2002-1383", "CVE-2002-1384"); name["english"] = "SUSE-SA:2003:002: cups"; script_name(english:name["english"]); script_set_attribute(attribute:"synopsis", value: "The remote host is missing a vendor-supplied security patch" ); script_set_attribute(attribute:"description", value: "The remote host is missing the patch for the advisory SUSE-SA:2003:002 (cups). CUPS is a well known and widely used printing system for unix-like systems. iDFENSE reported several security issues with CUPS that can lead to local and remote root compromise. The following list includes all vulnerabilities: - integer overflow in HTTP interface to gain remote access with CUPS privileges - local file race condition to gain root (bug mentioned above has to be exploited first) - remotely add printers - remote denial-of-service attack due to negative length in memcpy() call - integer overflow in image handling code to gain higher privileges - gain local root due to buffer overflow of 'options' buffer - design problem to gain local root (needs added printer, see above) - wrong handling of zero width images can be abused to gain higher privileges - file descriptor leak and denial-of-service due to missing checks of return values of file/socket operations Since SUSE 8.1 CUPS is the default printing system. As a temporary workaround CUPS can be disabled and an alternative printing system like LPRng can be installed instead. New CUPS packages are available on our FTP servers. Please, install them to fix your system. Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement. Then, install the package using the command 'rpm -Fhv file.rpm' to apply the update." ); script_set_attribute(attribute:"solution", value: "http://www.suse.de/security/2003_002_cups.html" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/25"); script_cvs_date("Date: 2019/10/25 13:36:27"); script_end_attributes(); summary["english"] = "Check for the version of the cups package"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc."); family["english"] = "SuSE Local Security Checks"; script_family(english:family["english"]); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/SuSE/rpm-list"); exit(0); } include("rpm.inc"); if ( rpm_check( reference:"cups-1.1.6-121", release:"SUSE7.1") ) { security_hole(0); exit(0); } if ( rpm_check( reference:"cups-1.1.6-122", release:"SUSE7.2") ) { security_hole(0); exit(0); } if ( rpm_check( reference:"cups-1.1.10-94", release:"SUSE7.3") ) { security_hole(0); exit(0); } if ( rpm_check( reference:"cups-libs-1.1.10-94", release:"SUSE7.3") ) { security_hole(0); exit(0); } if ( rpm_check( reference:"cups-client-1.1.10-94", release:"SUSE7.3") ) { security_hole(0); exit(0); } if ( rpm_check( reference:"cups-1.1.12-90", release:"SUSE8.0") ) { security_hole(0); exit(0); } if ( rpm_check( reference:"cups-libs-1.1.12-90", release:"SUSE8.0") ) { security_hole(0); exit(0); } if ( rpm_check( reference:"cups-client-1.1.12-90", release:"SUSE8.0") ) { security_hole(0); exit(0); } if ( rpm_check( reference:"cups-1.1.15-69", release:"SUSE8.1") ) { security_hole(0); exit(0); } if ( rpm_check( reference:"cups-libs-1.1.15-69", release:"SUSE8.1") ) { security_hole(0); exit(0); } if ( rpm_check( reference:"cups-client-1.1.15-69", release:"SUSE8.1") ) { security_hole(0); exit(0); } if (rpm_exists(rpm:"cups-", release:"SUSE7.1") || rpm_exists(rpm:"cups-", release:"SUSE7.2") || rpm_exists(rpm:"cups-", release:"SUSE7.3") || rpm_exists(rpm:"cups-", release:"SUSE8.0") || rpm_exists(rpm:"cups-", release:"SUSE8.1") ) { set_kb_item(name:"CVE-2002-1366", value:TRUE); set_kb_item(name:"CVE-2002-1367", value:TRUE); set_kb_item(name:"CVE-2002-1368", value:TRUE); set_kb_item(name:"CVE-2002-1369", value:TRUE); set_kb_item(name:"CVE-2002-1371", value:TRUE); set_kb_item(name:"CVE-2002-1372", value:TRUE); set_kb_item(name:"CVE-2002-1383", value:TRUE); set_kb_item(name:"CVE-2002-1384", value:TRUE); }
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-222.NASL description iDEFENSE discovered an integer overflow in the pdftops filter from the xpdf package that can be exploited to gain the privileges of the target user. This can lead to gaining unauthorized access to the last seen 2020-06-01 modified 2020-06-02 plugin id 15059 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/15059 title Debian DSA-222-1 : xpdf - integer overflow NASL family Debian Local Security Checks NASL id DEBIAN_DSA-232.NASL description Multiple vulnerabilities were discovered in the Common Unix Printing System (CUPS). Several of these issues represent the potential for a remote compromise or denial of service. The Common Vulnerabilities and Exposures project identifies the following problems : - CAN-2002-1383: Multiple integer overflows allow a remote attacker to execute arbitrary code via the CUPSd HTTP interface and the image handling code in CUPS filters. - CAN-2002-1366: Race conditions in connection with /etc/cups/certs/ allow local users with lp privileges to create or overwrite arbitrary files. This is not present in the potato version. - CAN-2002-1367: This vulnerability allows a remote attacker to add printers without authentication via a certain UDP packet, which can then be used to perform unauthorized activities such as stealing the local root certificate for the administration server via a last seen 2020-06-01 modified 2020-06-02 plugin id 15069 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/15069 title Debian DSA-232-1 : cupsys - several vulnerabilities NASL family Debian Local Security Checks NASL id DEBIAN_DSA-226.NASL description iDEFENSE discovered an integer overflow in the pdftops filter from the xpdf and xpdf-i packages that can be exploited to gain the privileges of the target user. This can lead to gaining unauthorized access to the last seen 2020-06-01 modified 2020-06-02 plugin id 15063 published 2004-09-29 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/15063 title Debian DSA-226-1 : xpdf-i - integer overflow NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2003-001.NASL description iDefense reported several security problems in CUPS that can lead to local and remote root compromise. An integer overflow in the HTTP interface can be used to gain remote access with CUPS privilege. A local file race condition can be used to gain root privilege, although the previous bug must be exploited first. An attacker can remotely add printers to the vulnerable system. A remote DoS can be accomplished due to negative length in the memcpy() call. An integer overflow in image handling code can be used to gain higher privilege. An attacker can gain local root privilege due to a buffer overflow of the last seen 2020-06-01 modified 2020-06-02 plugin id 13986 published 2004-07-31 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/13986 title Mandrake Linux Security Advisory : cups (MDKSA-2003:001) NASL family Mandriva Local Security Checks NASL id MANDRAKE_MDKSA-2003-002.NASL description The pdftops filter found in both the xpdf and CUPS packages suffers from an integer overflow that can be exploited to gain the privilege of the victim user. last seen 2020-06-01 modified 2020-06-02 plugin id 13987 published 2004-07-31 reporter This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/13987 title Mandrake Linux Security Advisory : xpdf (MDKSA-2003:002) NASL family Misc. NASL id CUPS_VULNS.NASL description The remote CUPS server seems vulnerable to various flaws (buffer overflow, denial of service, privilege escalation) that could allow a remote attacker to shut down this service or remotely gain the privileges of the last seen 2020-06-01 modified 2020-06-02 plugin id 11199 published 2003-01-18 reporter This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/11199 title CUPS < 1.1.18 Multiple Vulnerabilities
Redhat
advisories |
|
References
- http://marc.info/?l=bugtraq&m=104152282309980&w=2
- http://www.debian.org/security/2003/dsa-222
- http://www.debian.org/security/2003/dsa-226
- http://www.debian.org/security/2003/dsa-232
- http://www.idefense.com/advisory/12.23.02.txt
- http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001
- http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:002
- http://www.novell.com/linux/security/advisories/2003_002_cups.html
- http://www.redhat.com/support/errata/RHSA-2002-295.html
- http://www.redhat.com/support/errata/RHSA-2002-307.html
- http://www.redhat.com/support/errata/RHSA-2003-037.html
- http://www.redhat.com/support/errata/RHSA-2003-216.html
- http://www.securityfocus.com/bid/6475
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10937