Vulnerabilities > CVE-2009-0163 - Numeric Errors vulnerability in Apple Cups
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2009-0428.NASL description From Red Hat Security Advisory 2009:0428 : Updated cups packages that fix one security issue are now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Common UNIX(r) Printing System (CUPS) provides a portable printing layer for UNIX operating systems. An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, last seen 2020-06-01 modified 2020-06-02 plugin id 67843 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67843 title Oracle Linux 3 : cups (ELSA-2009-0428) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2009:0428 and # Oracle Linux Security Advisory ELSA-2009-0428 respectively. # include("compat.inc"); if (description) { script_id(67843); script_version("1.9"); script_cvs_date("Date: 2019/10/25 13:36:08"); script_cve_id("CVE-2009-0163"); script_bugtraq_id(34571); script_xref(name:"RHSA", value:"2009:0428"); script_name(english:"Oracle Linux 3 : cups (ELSA-2009-0428)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote Oracle Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "From Red Hat Security Advisory 2009:0428 : Updated cups packages that fix one security issue are now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Common UNIX(r) Printing System (CUPS) provides a portable printing layer for UNIX operating systems. An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, 'imagetops' and 'imagetoraster'. An attacker could create a malicious TIFF file that could, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0163) Red Hat would like to thank Aaron Sigel of the Apple Product Security team for responsibly reporting this flaw. Users of cups are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the cupsd daemon will be restarted automatically." ); script_set_attribute( attribute:"see_also", value:"https://oss.oracle.com/pipermail/el-errata/2009-April/000973.html" ); script_set_attribute(attribute:"solution", value:"Update the affected cups packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:cups"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:cups-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:cups-libs"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:3"); script_set_attribute(attribute:"vuln_publication_date", value:"2009/04/23"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/12"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Oracle Linux Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux"); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux"); os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux"); os_ver = os_ver[1]; if (! preg(pattern:"^3([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 3", "Oracle Linux " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu); flag = 0; if (rpm_check(release:"EL3", cpu:"i386", reference:"cups-1.1.17-13.3.58")) flag++; if (rpm_check(release:"EL3", cpu:"x86_64", reference:"cups-1.1.17-13.3.58")) flag++; if (rpm_check(release:"EL3", cpu:"i386", reference:"cups-devel-1.1.17-13.3.58")) flag++; if (rpm_check(release:"EL3", cpu:"x86_64", reference:"cups-devel-1.1.17-13.3.58")) flag++; if (rpm_check(release:"EL3", cpu:"i386", reference:"cups-libs-1.1.17-13.3.58")) flag++; if (rpm_check(release:"EL3", cpu:"x86_64", reference:"cups-libs-1.1.17-13.3.58")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cups / cups-devel / cups-libs"); }
NASL family Misc. NASL id CUPS_1_3_10.NASL description According to its banner, the version of CUPS installed on the remote host is earlier than 1.3.10. Such versions are affected by several issues : - A potential integer overflow in the PNG image validation code in last seen 2020-06-01 modified 2020-06-02 plugin id 36183 published 2009-04-17 reporter This script is Copyright (C) 2009-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/36183 title CUPS < 1.3.10 Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(36183); script_version("1.24"); script_cvs_date("Date: 2018/11/15 20:50:23"); script_cve_id( "CVE-2008-5286", "CVE-2009-0163", "CVE-2009-0164", "CVE-2009-0195", "CVE-2009-0949" ); script_bugtraq_id(32518, 34571, 34665, 34791, 35169); script_xref(name:"Secunia", value:"34481"); script_name(english:"CUPS < 1.3.10 Multiple Vulnerabilities"); script_summary(english:"Checks CUPS server version"); script_set_attribute(attribute:"synopsis", value:"The remote printer service is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "According to its banner, the version of CUPS installed on the remote host is earlier than 1.3.10. Such versions are affected by several issues : - A potential integer overflow in the PNG image validation code in '_cupsImageReadPNG()' could allow an attacker to crash the affected service or possibly execute arbitrary code. (STR #2974) - A heap-based integer overflow exists in '_cupsImageReadTIFF()' due to a failure to properly validate the image height of a specially crafted TIFF file, which can be leveraged to execute arbitrary code. (STR #3031) - The web interface may be vulnerable to DNS rebinding attacks due to a failure to validate the HTTP Host header in incoming requests. (STR #3118) - A heap-based buffer overflow in pdftops allows remote attackers to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments. (CVE-2009-0195) - Flawed 'ip' structure initialization in the function 'ippReadIO()' could allow an anonymous remote attacker to crash the application via a malicious IPP request packet with two consecutives IPP_TAG_UNSUPPORTED tags. (CVE-2009-0949)"); script_set_attribute(attribute:"see_also", value:"http://www.cups.org/str.php?L2974"); script_set_attribute(attribute:"see_also", value:"http://www.cups.org/str.php?L3031"); script_set_attribute(attribute:"see_also", value:"http://www.cups.org/str.php?L3118"); script_set_attribute(attribute:"see_also", value:"https://secuniaresearch.flexerasoftware.com/secunia_research/2009-18/"); script_set_attribute(attribute:"see_also", value:"http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability"); script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/504032/30/0/threaded"); script_set_attribute(attribute:"see_also", value:"http://www.cups.org/articles.php?L582"); script_set_attribute(attribute:"solution", value:"Upgrade to CUPS version 1.3.10 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_cwe_id(20, 119, 189, 399); script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/17"); script_set_attribute(attribute:"potential_vulnerability", value:"true"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:cups"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Misc."); script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc."); script_dependencies("http_version.nasl", "cups_1_3_5.nasl"); script_require_keys("www/cups", "Settings/ParanoidReport"); script_require_ports("Services/www", 631); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("http.inc"); port = get_http_port(default:631, embedded:TRUE); get_kb_item_or_exit("www/"+port+"/cups/running"); version = get_kb_item_or_exit("cups/"+port+"/version"); source = get_kb_item_or_exit("cups/"+port+"/source"); if (report_paranoia < 2) audit(AUDIT_PARANOID); if ( version =~ "^1\.([0-2]|3\.[0-9])($|[^0-9])" || version =~ "^1\.3(rc|b)" ) { if (report_verbosity > 0) { report = '\n Version source : ' + source + '\n Installed version : ' + version + '\n Fixed version : 1.3.10\n'; security_hole(port:port, extra:report); } else security_hole(port); exit(0); } else if (version =~ "^(1|1\.3)($|[^0-9.])") audit(AUDIT_VER_NOT_GRANULAR, "CUPS", port, version); else audit(AUDIT_LISTEN_NOT_VULN, "CUPS", port, version);
NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-760-1.NASL description It was discovered that CUPS did not properly check the height of TIFF images. If a user or automated system were tricked into opening a crafted TIFF image file, a remote attacker could cause a denial of service or possibly execute arbitrary code with user privileges. In Ubuntu 7.10, 8.04 LTS, and 8.10, attackers would be isolated by the AppArmor CUPS profile. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 37978 published 2009-04-23 reporter Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/37978 title Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : cups, cupsys vulnerability (USN-760-1) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Ubuntu Security Notice USN-760-1. The text # itself is copyright (C) Canonical, Inc. See # <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered # trademark of Canonical, Inc. # include("compat.inc"); if (description) { script_id(37978); script_version("1.13"); script_cvs_date("Date: 2019/08/02 13:33:02"); script_cve_id("CVE-2009-0163"); script_xref(name:"USN", value:"760-1"); script_name(english:"Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : cups, cupsys vulnerability (USN-760-1)"); script_summary(english:"Checks dpkg output for updated packages."); script_set_attribute( attribute:"synopsis", value: "The remote Ubuntu host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "It was discovered that CUPS did not properly check the height of TIFF images. If a user or automated system were tricked into opening a crafted TIFF image file, a remote attacker could cause a denial of service or possibly execute arbitrary code with user privileges. In Ubuntu 7.10, 8.04 LTS, and 8.10, attackers would be isolated by the AppArmor CUPS profile. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://usn.ubuntu.com/760-1/" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_cwe_id(189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:cups"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:cups-bsd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:cups-client"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:cups-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:cups-dbg"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:cupsys"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:cupsys-bsd"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:cupsys-client"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:cupsys-common"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:cupsys-dbg"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libcups2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libcups2-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libcupsimage2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libcupsimage2-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libcupsys2"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libcupsys2-dev"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:libcupsys2-gnutls10"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:6.06:-:lts"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:7.10"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:8.04:-:lts"); script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:8.10"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/23"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"Ubuntu Security Notice (C) 2009-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Ubuntu Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("ubuntu.inc"); include("misc_func.inc"); if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/Ubuntu/release"); if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu"); release = chomp(release); if (! ereg(pattern:"^(6\.06|7\.10|8\.04|8\.10)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 6.06 / 7.10 / 8.04 / 8.10", "Ubuntu " + release); if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu); flag = 0; if (ubuntu_check(osver:"6.06", pkgname:"cupsys", pkgver:"1.2.2-0ubuntu0.6.06.13")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"cupsys-bsd", pkgver:"1.2.2-0ubuntu0.6.06.13")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"cupsys-client", pkgver:"1.2.2-0ubuntu0.6.06.13")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libcupsimage2", pkgver:"1.2.2-0ubuntu0.6.06.13")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libcupsimage2-dev", pkgver:"1.2.2-0ubuntu0.6.06.13")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libcupsys2", pkgver:"1.2.2-0ubuntu0.6.06.13")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libcupsys2-dev", pkgver:"1.2.2-0ubuntu0.6.06.13")) flag++; if (ubuntu_check(osver:"6.06", pkgname:"libcupsys2-gnutls10", pkgver:"1.2.2-0ubuntu0.6.06.13")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"cupsys", pkgver:"1.3.2-1ubuntu7.10")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"cupsys-bsd", pkgver:"1.3.2-1ubuntu7.10")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"cupsys-client", pkgver:"1.3.2-1ubuntu7.10")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"cupsys-common", pkgver:"1.3.2-1ubuntu7.10")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libcupsimage2", pkgver:"1.3.2-1ubuntu7.10")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libcupsimage2-dev", pkgver:"1.3.2-1ubuntu7.10")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libcupsys2", pkgver:"1.3.2-1ubuntu7.10")) flag++; if (ubuntu_check(osver:"7.10", pkgname:"libcupsys2-dev", pkgver:"1.3.2-1ubuntu7.10")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"cupsys", pkgver:"1.3.7-1ubuntu3.4")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"cupsys-bsd", pkgver:"1.3.7-1ubuntu3.4")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"cupsys-client", pkgver:"1.3.7-1ubuntu3.4")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"cupsys-common", pkgver:"1.3.7-1ubuntu3.4")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libcupsimage2", pkgver:"1.3.7-1ubuntu3.4")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libcupsimage2-dev", pkgver:"1.3.7-1ubuntu3.4")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libcupsys2", pkgver:"1.3.7-1ubuntu3.4")) flag++; if (ubuntu_check(osver:"8.04", pkgname:"libcupsys2-dev", pkgver:"1.3.7-1ubuntu3.4")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"cups", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"cups-bsd", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"cups-client", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"cups-common", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"cups-dbg", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"cupsys", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"cupsys-bsd", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"cupsys-client", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"cupsys-common", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"cupsys-dbg", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libcups2", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libcups2-dev", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libcupsimage2", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libcupsimage2-dev", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libcupsys2", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (ubuntu_check(osver:"8.10", pkgname:"libcupsys2-dev", pkgver:"1.3.9-2ubuntu9.1")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : ubuntu_report_get() ); exit(0); } else { tested = ubuntu_pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cups / cups-bsd / cups-client / cups-common / cups-dbg / cupsys / etc"); }
NASL family SuSE Local Security Checks NASL id SUSE_11_0_CUPS-090416.NASL description Specially crafted tiff files could cause an integer overflow in the last seen 2020-06-01 modified 2020-06-02 plugin id 39944 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/39944 title openSUSE Security Update : cups (cups-784) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update cups-784. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(39944); script_version("1.11"); script_cvs_date("Date: 2019/10/25 13:36:33"); script_cve_id("CVE-2009-0163"); script_name(english:"openSUSE Security Update : cups (cups-784)"); script_summary(english:"Check for the cups-784 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "Specially crafted tiff files could cause an integer overflow in the 'imagetops' filter (CVE-2009-0163)." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=485895" ); script_set_attribute(attribute:"solution", value:"Update the affected cups packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_cwe_id(189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups-client"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups-libs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups-libs-32bit"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:11.0"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/07/21"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE11\.0)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "11.0", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE11.0", reference:"cups-1.3.7-25.8") ) flag++; if ( rpm_check(release:"SUSE11.0", reference:"cups-client-1.3.7-25.8") ) flag++; if ( rpm_check(release:"SUSE11.0", reference:"cups-devel-1.3.7-25.8") ) flag++; if ( rpm_check(release:"SUSE11.0", reference:"cups-libs-1.3.7-25.8") ) flag++; if ( rpm_check(release:"SUSE11.0", cpu:"x86_64", reference:"cups-libs-32bit-1.3.7-25.8") ) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cups / cups-client / cups-devel / cups-libs / cups-libs-32bit"); }
NASL family FreeBSD Local Security Checks NASL id FREEBSD_PKG_736E55BC39BB11DEA493001B77D09812.NASL description Gentoo security team summarizes : The following issues were reported in CUPS : - iDefense reported an integer overflow in the _cupsImageReadTIFF() function in the last seen 2020-06-01 modified 2020-06-02 plugin id 38705 published 2009-05-08 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/38705 title FreeBSD : cups -- remote code execution and DNS rebinding (736e55bc-39bb-11de-a493-001b77d09812) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from the FreeBSD VuXML database : # # Copyright 2003-2018 Jacques Vidrine and contributors # # Redistribution and use in source (VuXML) and 'compiled' forms (SGML, # HTML, PDF, PostScript, RTF and so forth) with or without modification, # are permitted provided that the following conditions are met: # 1. Redistributions of source code (VuXML) must retain the above # copyright notice, this list of conditions and the following # disclaimer as the first lines of this file unmodified. # 2. Redistributions in compiled form (transformed to other DTDs, # published online in any format, converted to PDF, PostScript, # RTF and other formats) must reproduce the above copyright # notice, this list of conditions and the following disclaimer # in the documentation and/or other materials provided with the # distribution. # # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION, # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. # include("compat.inc"); if (description) { script_id(38705); script_version("1.17"); script_cvs_date("Date: 2019/08/02 13:32:40"); script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0164", "CVE-2009-0166"); script_bugtraq_id(34568, 34571, 34665); script_name(english:"FreeBSD : cups -- remote code execution and DNS rebinding (736e55bc-39bb-11de-a493-001b77d09812)"); script_summary(english:"Checks for updated package in pkg_info output"); script_set_attribute( attribute:"synopsis", value:"The remote FreeBSD host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Gentoo security team summarizes : The following issues were reported in CUPS : - iDefense reported an integer overflow in the _cupsImageReadTIFF() function in the 'imagetops' filter, leading to a heap-based buffer overflow (CVE-2009-0163). - Aaron Siegel of Apple Product Security reported that the CUPS web interface does not verify the content of the 'Host' HTTP header properly (CVE-2009-0164). - Braden Thomas and Drew Yao of Apple Product Security reported that CUPS is vulnerable to CVE-2009-0146, CVE-2009-0147 and CVE-2009-0166, found earlier in xpdf and poppler. A remote attacker might send or entice a user to send a specially crafted print job to CUPS, possibly resulting in the execution of arbitrary code with the privileges of the configured CUPS user -- by default this is 'lp', or a Denial of Service. Furthermore, the web interface could be used to conduct DNS rebinding attacks." ); # http://www.cups.org/articles.php?L582 script_set_attribute( attribute:"see_also", value:"https://www.cups.org/articles.php?L582" ); # https://vuxml.freebsd.org/freebsd/736e55bc-39bb-11de-a493-001b77d09812.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?61756754" ); script_set_attribute(attribute:"solution", value:"Update the affected package."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(20, 119, 189, 399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:cups-base"); script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd"); script_set_attribute(attribute:"vuln_publication_date", value:"2009/05/05"); script_set_attribute(attribute:"patch_publication_date", value:"2009/05/07"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/05/08"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"FreeBSD Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info"); exit(0); } include("audit.inc"); include("freebsd_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD"); if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (pkg_test(save_report:TRUE, pkg:"cups-base<1.3.10")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Scientific Linux Local Security Checks NASL id SL_20090416_CUPS_ON_SL3_X.NASL description An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, last seen 2020-06-01 modified 2020-06-02 plugin id 60567 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60567 title Scientific Linux Security Update : cups on SL3.x i386/x86_64 code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text is (C) Scientific Linux. # include("compat.inc"); if (description) { script_id(60567); script_version("1.4"); script_cvs_date("Date: 2019/10/25 13:36:18"); script_cve_id("CVE-2009-0163"); script_name(english:"Scientific Linux Security Update : cups on SL3.x i386/x86_64"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Scientific Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, 'imagetops' and 'imagetoraster'. An attacker could create a malicious TIFF file that could, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0163) After installing the update, the cupsd daemon will be restarted automatically." ); # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0904&L=scientific-linux-errata&T=0&P=1964 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?a663e60c" ); script_set_attribute( attribute:"solution", value:"Update the affected cups, cups-devel and / or cups-libs packages." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_cwe_id(189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/01"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Scientific Linux Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux"); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu); flag = 0; if (rpm_check(release:"SL3", reference:"cups-1.1.17-13.3.58")) flag++; if (rpm_check(release:"SL3", reference:"cups-devel-1.1.17-13.3.58")) flag++; if (rpm_check(release:"SL3", reference:"cups-libs-1.1.17-13.3.58")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Gentoo Local Security Checks NASL id GENTOO_GLSA-200904-20.NASL description The remote host is affected by the vulnerability described in GLSA-200904-20 (CUPS: Multiple vulnerabilities) The following issues were reported in CUPS: iDefense reported an integer overflow in the _cupsImageReadTIFF() function in the last seen 2020-06-01 modified 2020-06-02 plugin id 38161 published 2009-04-27 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/38161 title GLSA-200904-20 : CUPS: Multiple vulnerabilities code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Gentoo Linux Security Advisory GLSA 200904-20. # # The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc. # and licensed under the Creative Commons - Attribution / Share Alike # license. See http://creativecommons.org/licenses/by-sa/3.0/ # include("compat.inc"); if (description) { script_id(38161); script_version("1.18"); script_cvs_date("Date: 2019/08/02 13:32:45"); script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0164", "CVE-2009-0166"); script_bugtraq_id(34568, 34571); script_xref(name:"GLSA", value:"200904-20"); script_name(english:"GLSA-200904-20 : CUPS: Multiple vulnerabilities"); script_summary(english:"Checks for updated package(s) in /var/db/pkg"); script_set_attribute( attribute:"synopsis", value: "The remote Gentoo host is missing one or more security-related patches." ); script_set_attribute( attribute:"description", value: "The remote host is affected by the vulnerability described in GLSA-200904-20 (CUPS: Multiple vulnerabilities) The following issues were reported in CUPS: iDefense reported an integer overflow in the _cupsImageReadTIFF() function in the 'imagetops' filter, leading to a heap-based buffer overflow (CVE-2009-0163). Aaron Siegel of Apple Product Security reported that the CUPS web interface does not verify the content of the 'Host' HTTP header properly (CVE-2009-0164). Braden Thomas and Drew Yao of Apple Product Security reported that CUPS is vulnerable to CVE-2009-0146, CVE-2009-0147 and CVE-2009-0166, found earlier in xpdf and poppler. Impact : A remote attacker might send or entice a user to send a specially crafted print job to CUPS, possibly resulting in the execution of arbitrary code with the privileges of the configured CUPS user -- by default this is 'lp', or a Denial of Service. Furthermore, the web interface could be used to conduct DNS rebinding attacks. Workaround : There is no known workaround at this time." ); script_set_attribute( attribute:"see_also", value:"https://security.gentoo.org/glsa/200904-20" ); script_set_attribute( attribute:"solution", value: "All CUPS users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose '>=net-print/cups-1.3.10'" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(20, 119, 189, 399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:gentoo:linux:cups"); script_set_attribute(attribute:"cpe", value:"cpe:/o:gentoo:linux"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/23"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/27"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"Gentoo Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Gentoo/release", "Host/Gentoo/qpkg-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("qpkg.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Gentoo/release")) audit(AUDIT_OS_NOT, "Gentoo"); if (!get_kb_item("Host/Gentoo/qpkg-list")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (qpkg_check(package:"net-print/cups", unaffected:make_list("ge 1.3.10"), vulnerable:make_list("lt 1.3.10"))) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:qpkg_report_get()); else security_warning(0); exit(0); } else { tested = qpkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "CUPS"); }
NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2009-0429.NASL description From Red Hat Security Advisory 2009:0429 : Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX(r) Printing System (CUPS) provides a portable printing layer for UNIX operating systems. Multiple integer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the last seen 2020-06-01 modified 2020-06-02 plugin id 67844 published 2013-07-12 reporter This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/67844 title Oracle Linux 4 / 5 : cups (ELSA-2009-0429) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2009:0429 and # Oracle Linux Security Advisory ELSA-2009-0429 respectively. # include("compat.inc"); if (description) { script_id(67844); script_version("1.12"); script_cvs_date("Date: 2019/10/25 13:36:08"); script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0166", "CVE-2009-0195", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183"); script_bugtraq_id(34571); script_xref(name:"RHSA", value:"2009:0429"); script_name(english:"Oracle Linux 4 / 5 : cups (ELSA-2009-0429)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote Oracle Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "From Red Hat Security Advisory 2009:0429 : Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX(r) Printing System (CUPS) provides a portable printing layer for UNIX operating systems. Multiple integer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0147, CVE-2009-1179) Multiple buffer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0146, CVE-2009-1182) Multiple flaws were found in the CUPS JBIG2 decoder that could lead to the freeing of arbitrary memory. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0166, CVE-2009-1180) Multiple input validation flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0800) An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, 'imagetops' and 'imagetoraster'. An attacker could create a malicious TIFF file that could, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0163) Multiple denial of service flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash when printed. (CVE-2009-0799, CVE-2009-1181, CVE-2009-1183) Red Hat would like to thank Aaron Sigel, Braden Thomas and Drew Yao of the Apple Product Security team, and Will Dormann of the CERT/CC for responsibly reporting these flaws. Users of cups are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the cupsd daemon will be restarted automatically." ); script_set_attribute( attribute:"see_also", value:"https://oss.oracle.com/pipermail/el-errata/2009-April/000975.html" ); script_set_attribute( attribute:"see_also", value:"https://oss.oracle.com/pipermail/el-errata/2009-April/000976.html" ); script_set_attribute(attribute:"solution", value:"Update the affected cups packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(20, 119, 189, 399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:cups"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:cups-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:cups-libs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:cups-lpd"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:4"); script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:5"); script_set_attribute(attribute:"vuln_publication_date", value:"2009/04/23"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/12"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Oracle Linux Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux"); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux"); os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux"); os_ver = os_ver[1]; if (! preg(pattern:"^(4|5)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 4 / 5", "Oracle Linux " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu); flag = 0; if (rpm_check(release:"EL4", reference:"cups-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"EL4", reference:"cups-devel-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"EL4", reference:"cups-libs-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"EL5", reference:"cups-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"EL5", reference:"cups-devel-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"EL5", reference:"cups-libs-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"EL5", reference:"cups-lpd-1.3.7-8.el5_3.4")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cups / cups-devel / cups-libs / cups-lpd"); }
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2009-0428.NASL description Updated cups packages that fix one security issue are now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Common UNIX(r) Printing System (CUPS) provides a portable printing layer for UNIX operating systems. An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, last seen 2020-06-01 modified 2020-06-02 plugin id 36178 published 2009-04-17 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/36178 title RHEL 3 : cups (RHSA-2009:0428) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2009:0428. The text # itself is copyright (C) Red Hat, Inc. # include("compat.inc"); if (description) { script_id(36178); script_version ("1.25"); script_cvs_date("Date: 2019/10/25 13:36:14"); script_cve_id("CVE-2009-0163"); script_bugtraq_id(34571); script_xref(name:"RHSA", value:"2009:0428"); script_name(english:"RHEL 3 : cups (RHSA-2009:0428)"); script_summary(english:"Checks the rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote Red Hat host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "Updated cups packages that fix one security issue are now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Common UNIX(r) Printing System (CUPS) provides a portable printing layer for UNIX operating systems. An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, 'imagetops' and 'imagetoraster'. An attacker could create a malicious TIFF file that could, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0163) Red Hat would like to thank Aaron Sigel of the Apple Product Security team for responsibly reporting this flaw. Users of cups are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the cupsd daemon will be restarted automatically." ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2009-0163" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2009:0428" ); script_set_attribute( attribute:"solution", value:"Update the affected cups, cups-devel and / or cups-libs packages." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cups"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cups-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cups-libs"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:3"); script_set_attribute(attribute:"vuln_publication_date", value:"2009/04/23"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/17"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Red Hat Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat"); os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat"); os_ver = os_ver[1]; if (! preg(pattern:"^3([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 3.x", "Red Hat " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu); yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo"); if (!empty_or_null(yum_updateinfo)) { rhsa = "RHSA-2009:0428"; yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa); if (!empty_or_null(yum_report)) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : yum_report ); exit(0); } else { audit_message = "affected by Red Hat security advisory " + rhsa; audit(AUDIT_OS_NOT, audit_message); } } else { flag = 0; if (rpm_check(release:"RHEL3", reference:"cups-1.1.17-13.3.58")) flag++; if (rpm_check(release:"RHEL3", reference:"cups-devel-1.1.17-13.3.58")) flag++; if (rpm_check(release:"RHEL3", reference:"cups-libs-1.1.17-13.3.58")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() + redhat_report_package_caveat() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cups / cups-devel / cups-libs"); } }
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2009-0429.NASL description Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX(r) Printing System (CUPS) provides a portable printing layer for UNIX operating systems. Multiple integer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the last seen 2020-06-01 modified 2020-06-02 plugin id 36179 published 2009-04-17 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/36179 title RHEL 4 / 5 : cups (RHSA-2009:0429) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2009:0429. The text # itself is copyright (C) Red Hat, Inc. # include("compat.inc"); if (description) { script_id(36179); script_version ("1.29"); script_cvs_date("Date: 2019/10/25 13:36:14"); script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0166", "CVE-2009-0195", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183"); script_bugtraq_id(34571); script_xref(name:"RHSA", value:"2009:0429"); script_name(english:"RHEL 4 / 5 : cups (RHSA-2009:0429)"); script_summary(english:"Checks the rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote Red Hat host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX(r) Printing System (CUPS) provides a portable printing layer for UNIX operating systems. Multiple integer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0147, CVE-2009-1179) Multiple buffer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0146, CVE-2009-1182) Multiple flaws were found in the CUPS JBIG2 decoder that could lead to the freeing of arbitrary memory. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0166, CVE-2009-1180) Multiple input validation flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0800) An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, 'imagetops' and 'imagetoraster'. An attacker could create a malicious TIFF file that could, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0163) Multiple denial of service flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash when printed. (CVE-2009-0799, CVE-2009-1181, CVE-2009-1183) Red Hat would like to thank Aaron Sigel, Braden Thomas and Drew Yao of the Apple Product Security team, and Will Dormann of the CERT/CC for responsibly reporting these flaws. Users of cups are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the cupsd daemon will be restarted automatically." ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2009-0146" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2009-0147" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2009-0163" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2009-0166" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2009-0195" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2009-0799" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2009-0800" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2009-1179" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2009-1180" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2009-1181" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2009-1182" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2009-1183" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2009:0429" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(20, 119, 189, 399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cups"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cups-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cups-libs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:cups-lpd"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:4.7"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:5.3"); script_set_attribute(attribute:"vuln_publication_date", value:"2009/04/23"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/17"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Red Hat Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat"); os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat"); os_ver = os_ver[1]; if (! preg(pattern:"^(4|5)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 4.x / 5.x", "Red Hat " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu); yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo"); if (!empty_or_null(yum_updateinfo)) { rhsa = "RHSA-2009:0429"; yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa); if (!empty_or_null(yum_report)) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : yum_report ); exit(0); } else { audit_message = "affected by Red Hat security advisory " + rhsa; audit(AUDIT_OS_NOT, audit_message); } } else { flag = 0; if (rpm_check(release:"RHEL4", reference:"cups-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"RHEL4", reference:"cups-devel-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"RHEL4", reference:"cups-libs-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"RHEL5", cpu:"i386", reference:"cups-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"cups-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"cups-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"RHEL5", reference:"cups-devel-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"RHEL5", reference:"cups-libs-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"RHEL5", cpu:"i386", reference:"cups-lpd-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"RHEL5", cpu:"s390x", reference:"cups-lpd-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"RHEL5", cpu:"x86_64", reference:"cups-lpd-1.3.7-8.el5_3.4")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : rpm_report_get() + redhat_report_package_caveat() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cups / cups-devel / cups-libs / cups-lpd"); } }
NASL family SuSE Local Security Checks NASL id SUSE_CUPS-6172.NASL description Specially crafted tiff files could cause an integer overflow in the last seen 2020-06-01 modified 2020-06-02 plugin id 37844 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/37844 title openSUSE 10 Security Update : cups (cups-6172) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update cups-6172. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(37844); script_version ("1.9"); script_cvs_date("Date: 2019/10/25 13:36:36"); script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183"); script_name(english:"openSUSE 10 Security Update : cups (cups-6172)"); script_summary(english:"Check for the cups-6172 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "Specially crafted tiff files could cause an integer overflow in the 'imagetops' filter (CVE-2009-0163). Specially crafted pdf files could cause overflows in the 'pdftops' filter (CVE-2009-0165, CVE-2009-0166, CVE-2009-0146, CVE-2009-0147, CVE-2009-0799, CVE-2009-0800, CVE-2009-1179, CVE-2009-1180, CVE-2009-1181, CVE-2009-1182, CVE-2009-1183)." ); script_set_attribute(attribute:"solution", value:"Update the affected cups packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_cwe_id(20, 119, 189, 399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups-client"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups-libs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups-libs-32bit"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:10.3"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/23"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE10\.3)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "10.3", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE10.3", reference:"cups-1.2.12-22.21") ) flag++; if ( rpm_check(release:"SUSE10.3", reference:"cups-client-1.2.12-22.21") ) flag++; if ( rpm_check(release:"SUSE10.3", reference:"cups-devel-1.2.12-22.21") ) flag++; if ( rpm_check(release:"SUSE10.3", reference:"cups-libs-1.2.12-22.21") ) flag++; if ( rpm_check(release:"SUSE10.3", cpu:"x86_64", reference:"cups-libs-32bit-1.2.12-22.21") ) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cups / cups-client / cups-devel / cups-libs / cups-libs-32bit"); }
NASL family Fedora Local Security Checks NASL id FEDORA_2009-3769.NASL description This update fixes several security issues: CVE-2009-0163, CVE-2009-0164, CVE-2009-0146, CVE-2009-0147, and CVE-2009-0166. PDF files are now converted to PostScript using the poppler package last seen 2020-06-01 modified 2020-06-02 plugin id 37075 published 2009-04-23 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/37075 title Fedora 10 : cups-1.3.10-1.fc10 (2009-3769) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Fedora Security Advisory 2009-3769. # include("compat.inc"); if (description) { script_id(37075); script_version ("1.17"); script_cvs_date("Date: 2019/08/02 13:32:29"); script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0164", "CVE-2009-0166"); script_bugtraq_id(34568, 34571); script_xref(name:"FEDORA", value:"2009-3769"); script_name(english:"Fedora 10 : cups-1.3.10-1.fc10 (2009-3769)"); script_summary(english:"Checks rpm output for the updated package."); script_set_attribute( attribute:"synopsis", value:"The remote Fedora host is missing a security update." ); script_set_attribute( attribute:"description", value: "This update fixes several security issues: CVE-2009-0163, CVE-2009-0164, CVE-2009-0146, CVE-2009-0147, and CVE-2009-0166. PDF files are now converted to PostScript using the poppler package's 'pdftops' program. NOTE: If your CUPS server is accessed using a hostname or hostnames not known to the server itself you must add 'ServerAlias hostname' to cupsd.conf for each such name. The special line 'ServerAlias *' disables checking (but this allows DNS rebinding attacks). Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=490596" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=490597" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=490612" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=490614" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.redhat.com/show_bug.cgi?id=490625" ); # https://lists.fedoraproject.org/pipermail/package-announce/2009-April/022466.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?9d60e7fc" ); script_set_attribute(attribute:"solution", value:"Update the affected cups package."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:ND/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(20, 119, 189, 399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:cups"); script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:10"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/21"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/23"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"Fedora Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora"); os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora"); os_ver = os_ver[1]; if (! ereg(pattern:"^10([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 10.x", "Fedora " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu); flag = 0; if (rpm_check(release:"FC10", reference:"cups-1.3.10-1.fc10")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cups"); }
NASL family SuSE Local Security Checks NASL id SUSE9_12396.NASL description The following bugs have been fixed : - Specially crafted tiff files could cause an integer overflow in the last seen 2020-06-01 modified 2020-06-02 plugin id 41292 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41292 title SuSE9 Security Update : CUPS (YOU Patch Number 12396) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The text description of this plugin is (C) Novell, Inc. # if (NASL_LEVEL < 3000) exit(0); include("compat.inc"); if (description) { script_id(41292); script_version("1.9"); script_cvs_date("Date: 2019/10/25 13:36:33"); script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0165", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183"); script_name(english:"SuSE9 Security Update : CUPS (YOU Patch Number 12396)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote SuSE 9 host is missing a security-related patch." ); script_set_attribute( attribute:"description", value: "The following bugs have been fixed : - Specially crafted tiff files could cause an integer overflow in the 'imagetops' filter. (CVE-2009-0163) - Specially crafted pdf files could cause overflows in the 'pdftops' filter. (CVE-2009-0165, CVE-2009-0166, CVE-2009-0146, CVE-2009-0147, CVE-2009-0799, CVE-2009-0800, CVE-2009-1179, CVE-2009-1180, CVE-2009-1181, CVE-2009-1182, CVE-2009-1183)" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-0146.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-0147.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-0163.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-0165.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-0166.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-0799.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-0800.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-1179.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-1180.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-1181.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-1182.html" ); script_set_attribute( attribute:"see_also", value:"http://support.novell.com/security/cve/CVE-2009-1183.html" ); script_set_attribute(attribute:"solution", value:"Apply YOU patch number 12396."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_cwe_id(20, 119, 189, 399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:suse:suse_linux"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/09/24"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) exit(0, "Local checks are not enabled."); if (!get_kb_item("Host/SuSE/release")) exit(0, "The host is not running SuSE."); if (!get_kb_item("Host/SuSE/rpm-list")) exit(1, "Could not obtain the list of installed packages."); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) exit(1, "Failed to determine the architecture type."); if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") exit(1, "Local checks for SuSE 9 on the '"+cpu+"' architecture have not been implemented."); flag = 0; if (rpm_check(release:"SUSE9", reference:"cups-1.1.20-108.58")) flag++; if (rpm_check(release:"SUSE9", reference:"cups-client-1.1.20-108.58")) flag++; if (rpm_check(release:"SUSE9", reference:"cups-devel-1.1.20-108.58")) flag++; if (rpm_check(release:"SUSE9", reference:"cups-libs-1.1.20-108.58")) flag++; if (rpm_check(release:"SUSE9", cpu:"x86_64", reference:"cups-libs-32bit-9-200904161449")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else exit(0, "The host is not affected.");
NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2009-0429.NASL description Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX(r) Printing System (CUPS) provides a portable printing layer for UNIX operating systems. Multiple integer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the last seen 2020-06-01 modified 2020-06-02 plugin id 38897 published 2009-05-26 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/38897 title CentOS 4 / 5 : cups (CESA-2009:0429) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2009:0429 and # CentOS Errata and Security Advisory 2009:0429 respectively. # include("compat.inc"); if (description) { script_id(38897); script_version("1.19"); script_cvs_date("Date: 2019/10/25 13:36:04"); script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0166", "CVE-2009-0195", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183"); script_bugtraq_id(34571); script_xref(name:"RHSA", value:"2009:0429"); script_name(english:"CentOS 4 / 5 : cups (CESA-2009:0429)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote CentOS host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX(r) Printing System (CUPS) provides a portable printing layer for UNIX operating systems. Multiple integer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0147, CVE-2009-1179) Multiple buffer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0146, CVE-2009-1182) Multiple flaws were found in the CUPS JBIG2 decoder that could lead to the freeing of arbitrary memory. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0166, CVE-2009-1180) Multiple input validation flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0800) An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, 'imagetops' and 'imagetoraster'. An attacker could create a malicious TIFF file that could, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0163) Multiple denial of service flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash when printed. (CVE-2009-0799, CVE-2009-1181, CVE-2009-1183) Red Hat would like to thank Aaron Sigel, Braden Thomas and Drew Yao of the Apple Product Security team, and Will Dormann of the CERT/CC for responsibly reporting these flaws. Users of cups are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, the cupsd daemon will be restarted automatically." ); # https://lists.centos.org/pipermail/centos-announce/2009-April/015778.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?ddf82a0f" ); # https://lists.centos.org/pipermail/centos-announce/2009-April/015794.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?73d4d874" ); # https://lists.centos.org/pipermail/centos-announce/2009-April/015795.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?29569a49" ); # https://lists.centos.org/pipermail/centos-announce/2009-May/015916.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?0271ac67" ); # https://lists.centos.org/pipermail/centos-announce/2009-May/015917.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?26622be5" ); script_set_attribute(attribute:"solution", value:"Update the affected cups packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(20, 119, 189, 399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cups"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cups-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cups-libs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cups-lpd"); script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:4"); script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:5"); script_set_attribute(attribute:"vuln_publication_date", value:"2009/04/23"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/05/26"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"CentOS Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/CentOS/release"); if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS"); os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS"); os_ver = os_ver[1]; if (! preg(pattern:"^(4|5)([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 4.x / 5.x", "CentOS " + os_ver); if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu); flag = 0; if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"cups-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"CentOS-4", cpu:"ia64", reference:"cups-1.1.22-0.rc1.9.27.c4.5")) flag++; if (rpm_check(release:"CentOS-4", cpu:"x86_64", reference:"cups-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"cups-devel-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"CentOS-4", cpu:"ia64", reference:"cups-devel-1.1.22-0.rc1.9.27.c4.5")) flag++; if (rpm_check(release:"CentOS-4", cpu:"x86_64", reference:"cups-devel-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"CentOS-4", cpu:"i386", reference:"cups-libs-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"CentOS-4", cpu:"ia64", reference:"cups-libs-1.1.22-0.rc1.9.27.c4.5")) flag++; if (rpm_check(release:"CentOS-4", cpu:"x86_64", reference:"cups-libs-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"CentOS-5", reference:"cups-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"CentOS-5", reference:"cups-devel-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"CentOS-5", reference:"cups-libs-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"CentOS-5", reference:"cups-lpd-1.3.7-8.el5_3.4")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cups / cups-devel / cups-libs / cups-lpd"); }
NASL family Scientific Linux Local Security Checks NASL id SL_20090416_CUPS_ON_SL4_X.NASL description Multiple integer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the last seen 2020-06-01 modified 2020-06-02 plugin id 60568 published 2012-08-01 reporter This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/60568 title Scientific Linux Security Update : cups on SL4.x, SL5.x i386/x86_64 code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text is (C) Scientific Linux. # include("compat.inc"); if (description) { script_id(60568); script_version("1.6"); script_cvs_date("Date: 2019/10/25 13:36:18"); script_cve_id("CVE-2009-0146", "CVE-2009-0147", "CVE-2009-0163", "CVE-2009-0166", "CVE-2009-0799", "CVE-2009-0800", "CVE-2009-1179", "CVE-2009-1180", "CVE-2009-1181", "CVE-2009-1182", "CVE-2009-1183"); script_name(english:"Scientific Linux Security Update : cups on SL4.x, SL5.x i386/x86_64"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Scientific Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "Multiple integer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0147, CVE-2009-1179) Multiple buffer overflow flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0146, CVE-2009-1182) Multiple flaws were found in the CUPS JBIG2 decoder that could lead to the freeing of arbitrary memory. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0166, CVE-2009-1180) Multiple input validation flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash or, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0800) An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, 'imagetops' and 'imagetoraster'. An attacker could create a malicious TIFF file that could, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0163) Multiple denial of service flaws were found in the CUPS JBIG2 decoder. An attacker could create a malicious PDF file that would cause CUPS to crash when printed. (CVE-2009-0799, CVE-2009-1181, CVE-2009-1183) After installing the update, the cupsd daemon will be restarted automatically." ); # https://listserv.fnal.gov/scripts/wa.exe?A2=ind0904&L=scientific-linux-errata&T=0&P=2085 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?02007bd8" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_cwe_id(20, 119, 189, 399); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux"); script_set_attribute(attribute:"vuln_publication_date", value:"2009/04/23"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/01"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Scientific Linux Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux"); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu); flag = 0; if (rpm_check(release:"SL4", reference:"cups-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"SL4", reference:"cups-devel-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"SL4", reference:"cups-libs-1.1.22-0.rc1.9.27.el4_7.5")) flag++; if (rpm_check(release:"SL5", reference:"cups-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"SL5", reference:"cups-devel-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"SL5", reference:"cups-libs-1.3.7-8.el5_3.4")) flag++; if (rpm_check(release:"SL5", reference:"cups-lpd-1.3.7-8.el5_3.4")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2009-0428.NASL description Updated cups packages that fix one security issue are now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Common UNIX(r) Printing System (CUPS) provides a portable printing layer for UNIX operating systems. An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, last seen 2020-06-01 modified 2020-06-02 plugin id 36187 published 2009-04-21 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/36187 title CentOS 3 : cups (CESA-2009:0428) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2009:0428 and # CentOS Errata and Security Advisory 2009:0428 respectively. # include("compat.inc"); if (description) { script_id(36187); script_version("1.16"); script_cvs_date("Date: 2019/10/25 13:36:04"); script_cve_id("CVE-2009-0163"); script_bugtraq_id(34571); script_xref(name:"RHSA", value:"2009:0428"); script_name(english:"CentOS 3 : cups (CESA-2009:0428)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote CentOS host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "Updated cups packages that fix one security issue are now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Common UNIX(r) Printing System (CUPS) provides a portable printing layer for UNIX operating systems. An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, 'imagetops' and 'imagetoraster'. An attacker could create a malicious TIFF file that could, potentially, execute arbitrary code as the 'lp' user if the file was printed. (CVE-2009-0163) Red Hat would like to thank Aaron Sigel of the Apple Product Security team for responsibly reporting this flaw. Users of cups are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the update, the cupsd daemon will be restarted automatically." ); # https://lists.centos.org/pipermail/centos-announce/2009-April/015774.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?a848cf32" ); # https://lists.centos.org/pipermail/centos-announce/2009-April/015786.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?ca168a35" ); # https://lists.centos.org/pipermail/centos-announce/2009-April/015787.html script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?1af0f30e" ); script_set_attribute(attribute:"solution", value:"Update the affected cups packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cups"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cups-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:centos:centos:cups-libs"); script_set_attribute(attribute:"cpe", value:"cpe:/o:centos:centos:3"); script_set_attribute(attribute:"vuln_publication_date", value:"2009/04/23"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/19"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/21"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"CentOS Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/CentOS/release", "Host/CentOS/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/CentOS/release"); if (isnull(release) || "CentOS" >!< release) audit(AUDIT_OS_NOT, "CentOS"); os_ver = pregmatch(pattern: "CentOS(?: Linux)? release ([0-9]+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "CentOS"); os_ver = os_ver[1]; if (! preg(pattern:"^3([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "CentOS 3.x", "CentOS " + os_ver); if (!get_kb_item("Host/CentOS/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && "ia64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "CentOS", cpu); flag = 0; if (rpm_check(release:"CentOS-3", reference:"cups-1.1.17-13.3.58")) flag++; if (rpm_check(release:"CentOS-3", reference:"cups-devel-1.1.17-13.3.58")) flag++; if (rpm_check(release:"CentOS-3", reference:"cups-libs-1.1.17-13.3.58")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_WARNING, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cups / cups-devel / cups-libs"); }
NASL family SuSE Local Security Checks NASL id SUSE_11_1_CUPS-090416.NASL description Specially crafted tiff files could cause an integer overflow in the last seen 2020-06-01 modified 2020-06-02 plugin id 40207 published 2009-07-21 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/40207 title openSUSE Security Update : cups (cups-784) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update cups-784. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(40207); script_version("1.11"); script_cvs_date("Date: 2019/10/25 13:36:34"); script_cve_id("CVE-2009-0163"); script_name(english:"openSUSE Security Update : cups (cups-784)"); script_summary(english:"Check for the cups-784 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "Specially crafted tiff files could cause an integer overflow in the 'imagetops' filter (CVE-2009-0163)." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.novell.com/show_bug.cgi?id=485895" ); script_set_attribute(attribute:"solution", value:"Update the affected cups packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_cwe_id(189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups-client"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups-libs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cups-libs-32bit"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:11.1"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/07/21"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 Tenable Network Security, Inc."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE11\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "11.1", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE11.1", reference:"cups-1.3.9-7.2.1") ) flag++; if ( rpm_check(release:"SUSE11.1", reference:"cups-client-1.3.9-7.2.1") ) flag++; if ( rpm_check(release:"SUSE11.1", reference:"cups-devel-1.3.9-7.2.1") ) flag++; if ( rpm_check(release:"SUSE11.1", reference:"cups-libs-1.3.9-7.2.1") ) flag++; if ( rpm_check(release:"SUSE11.1", cpu:"x86_64", reference:"cups-libs-32bit-1.3.9-7.2.1") ) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get()); else security_warning(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "cups / cups-client / cups-devel / cups-libs / cups-libs-32bit"); }
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-1773.NASL description It was discovered that the imagetops filter in cups, the Common UNIX Printing System, is prone to an integer overflow when reading malicious TIFF images. last seen 2020-06-01 modified 2020-06-02 plugin id 36173 published 2009-04-17 reporter This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/36173 title Debian DSA-1773-1 : cups - integer overflow code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-1773. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(36173); script_version("1.15"); script_cvs_date("Date: 2019/08/02 13:32:21"); script_cve_id("CVE-2009-0163"); script_bugtraq_id(34571); script_xref(name:"DSA", value:"1773"); script_name(english:"Debian DSA-1773-1 : cups - integer overflow"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "It was discovered that the imagetops filter in cups, the Common UNIX Printing System, is prone to an integer overflow when reading malicious TIFF images." ); script_set_attribute( attribute:"see_also", value:"https://www.debian.org/security/2009/dsa-1773" ); script_set_attribute( attribute:"solution", value: "Upgrade the cups packages. For the oldstable distribution (etch), this problem has been fixed in version 1.2.7-4etch7. For the stable distribution (lenny), this problem has been fixed in version 1.3.8-1lenny5." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(189); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:cups"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:4.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:5.0"); script_set_attribute(attribute:"patch_publication_date", value:"2009/04/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2009/04/17"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"4.0", prefix:"cupsys", reference:"1.2.7-4etch7")) flag++; if (deb_check(release:"4.0", prefix:"cupsys-bsd", reference:"1.2.7-4etch7")) flag++; if (deb_check(release:"4.0", prefix:"cupsys-client", reference:"1.2.7-4etch7")) flag++; if (deb_check(release:"4.0", prefix:"cupsys-common", reference:"1.2.7-4etch7")) flag++; if (deb_check(release:"4.0", prefix:"cupsys-dbg", reference:"1.2.7-4etch7")) flag++; if (deb_check(release:"4.0", prefix:"libcupsimage2", reference:"1.2.7-4etch7")) flag++; if (deb_check(release:"4.0", prefix:"libcupsimage2-dev", reference:"1.2.7-4etch7")) flag++; if (deb_check(release:"4.0", prefix:"libcupsys2", reference:"1.2.7-4etch7")) flag++; if (deb_check(release:"4.0", prefix:"libcupsys2-dev", reference:"1.2.7-4etch7")) flag++; if (deb_check(release:"4.0", prefix:"libcupsys2-gnutls10", reference:"1.2.7-4etch7")) flag++; if (deb_check(release:"5.0", prefix:"cups", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"cups-bsd", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"cups-client", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"cups-common", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"cups-dbg", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"cupsys", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"cupsys-bsd", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"cupsys-client", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"cupsys-common", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"cupsys-dbg", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"libcups2", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"libcups2-dev", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"libcupsimage2", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"libcupsimage2-dev", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"libcupsys2", reference:"1.3.8-1lenny5")) flag++; if (deb_check(release:"5.0", prefix:"libcupsys2-dev", reference:"1.3.8-1lenny5")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Mandriva Local Security Checks NASL id MANDRIVA_MDVSA-2009-282.NASL description Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap. (CVE-2009-0146, CVE-2009-0147) Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow. (CVE-2009-0163) Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to g*allocn. (CVE-2009-0165) The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a free of uninitialized memory. (CVE-2009-0166) Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9, and probably other products, allows remote attackers to execute arbitrary code via a PDF file with crafted JBIG2 symbol dictionary segments (CVE-2009-0195). Multiple integer overflows in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179. (CVE-2009-0791) The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read. (CVE-2009-0799) Multiple input validation flaws in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file. (CVE-2009-0800) The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags. (CVE-2009-0949) Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file. (CVE-2009-1179) The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data. (CVE-2009-1180) The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference. (CVE-2009-1181) Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file. (CVE-2009-1182) The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file. (CVE-2009-1183) Two integer overflow flaws were found in the CUPS pdftops filter. An attacker could create a malicious PDF file that would cause pdftops to crash or, potentially, execute arbitrary code as the lp user if the file was printed. (CVE-2009-3608, CVE-2009-3609) This update corrects the problems. Update : Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers last seen 2020-06-01 modified 2020-06-02 plugin id 42181 published 2009-10-20 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/42181 title Mandriva Linux Security Advisory : cups (MDVSA-2009:282-1) NASL family SuSE Local Security Checks NASL id SUSE_11_CUPS-090416.NASL description Specially crafted tiff files could cause an integer overflow in the last seen 2020-06-01 modified 2020-06-02 plugin id 41377 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41377 title SuSE 11 Security Update : CUPS (SAT Patch Number 790) NASL family Fedora Local Security Checks NASL id FEDORA_2009-3753.NASL description This update fixes several security issues: CVE-2009-0163, CVE-2009-0164, CVE-2009-0146, CVE-2009-0147, and CVE-2009-0166. PDF files are now converted to PostScript using the poppler package last seen 2020-06-01 modified 2020-06-02 plugin id 36209 published 2009-04-22 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/36209 title Fedora 9 : cups-1.3.10-1.fc9 (2009-3753) NASL family SuSE Local Security Checks NASL id SUSE_CUPS-6174.NASL description Specially crafted tiff files could cause an integer overflow in the last seen 2020-06-01 modified 2020-06-02 plugin id 41494 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41494 title SuSE 10 Security Update : CUPS (ZYPP Patch Number 6174) NASL family Slackware Local Security Checks NASL id SLACKWARE_SSA_2009-116-01.NASL description New cups packages are available for Slackware 12.0, 12.1, 12.2, and -current to fix security issues. last seen 2020-06-01 modified 2020-06-02 plugin id 38166 published 2009-04-27 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/38166 title Slackware 12.0 / 12.1 / 12.2 / current : cups (SSA:2009-116-01)
Oval
accepted | 2013-04-29T04:14:39.780-04:00 | ||||||||||||||||||||||||||||||||
class | vulnerability | ||||||||||||||||||||||||||||||||
contributors |
| ||||||||||||||||||||||||||||||||
definition_extensions |
| ||||||||||||||||||||||||||||||||
description | Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow. | ||||||||||||||||||||||||||||||||
family | unix | ||||||||||||||||||||||||||||||||
id | oval:org.mitre.oval:def:11546 | ||||||||||||||||||||||||||||||||
status | accepted | ||||||||||||||||||||||||||||||||
submitted | 2010-07-09T03:56:16-04:00 | ||||||||||||||||||||||||||||||||
title | Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow. | ||||||||||||||||||||||||||||||||
version | 27 |
Redhat
advisories |
| ||||||||
rpms |
|
Seebug
bulletinFamily exploit description BUGTRAQ ID: 34571 CVE ID:CVE-2009-0163 CNCVE ID:CNCVE-20090163 Common Unix Printing System(CUPS)是一款通用Unix打印系统,是Unix环境下的跨平台打印解决方案,基于Internet打印协议,提供大多数PostScript和raster打印机服务。 CUPS处理TIFF图像存在整数溢出,远程攻击者可以利用漏洞以应用程序权限执行任意指令。 当解析TIFF文件时,_cupsImageReadTIFF()函数没有正确验证来自文件爱你的'height'值,此值用于算术计算来决定动态堆缓冲区大小,通过提供超大值,可导致触发堆的缓冲区溢出,可能以应用程序权限执行任意指令。 Easy Software Products CUPS 1.3.9 Easy Software Products CUPS 1.3.8 Easy Software Products CUPS 1.3.7 Easy Software Products CUPS 1.3.6 Easy Software Products CUPS 1.3.5 Easy Software Products CUPS 1.3.3 Easy Software Products CUPS 1.3.2 Easy Software Products CUPS 1.2.12 Easy Software Products CUPS 1.2.10 Easy Software Products CUPS 1.2.9 Easy Software Products CUPS 1.2.8 Easy Software Products CUPS 1.2.4 Easy Software Products CUPS 1.2.2 Easy Software Products CUPS 1.1.23 rc1 + Gentoo Linux Easy Software Products CUPS 1.1.23 + Gentoo Linux Easy Software Products CUPS 1.1.22 rc1 Easy Software Products CUPS 1.1.22 Easy Software Products CUPS 1.1.21 + MandrakeSoft Linux Mandrake 10.1 x86_64 + MandrakeSoft Linux Mandrake 10.1 Easy Software Products CUPS 1.1.20 + ALT Linux ALT Linux Compact 2.3 + ALT Linux ALT Linux Junior 2.3 + Gentoo Linux 1.4 _rc3 + Gentoo Linux 1.4 _rc2 + Gentoo Linux 1.4 _rc1 + MandrakeSoft apcupsd 2006.0 + MandrakeSoft Linux Mandrake 10.0 AMD64 + MandrakeSoft Linux Mandrake 10.0 + S.u.S.E. Linux Personal 9.1 + Ubuntu Ubuntu Linux 4.1 ppc + Ubuntu Ubuntu Linux 4.1 ia64 + Ubuntu Ubuntu Linux 4.1 ia32 Easy Software Products CUPS 1.1.19 rc5 Easy Software Products CUPS 1.1.19 + MandrakeSoft Linux Mandrake 9.2 amd64 + MandrakeSoft Linux Mandrake 9.2 + Turbolinux Appliance Server 1.0 Workgroup Edition + Turbolinux Appliance Server 1.0 Hosting Edition + Turbolinux Appliance Server Hosting Edition 1.0 + Turbolinux Appliance Server Workgroup Edition 1.0 + Turbolinux Home + Turbolinux Turbolinux Desktop 10.0 + Turbolinux Turbolinux Server 8.0 + Turbolinux Turbolinux Workstation 8.0 Easy Software Products CUPS 1.1.18 + Conectiva Linux 9.0 + MandrakeSoft Corporate Server 2.1 x86_64 + MandrakeSoft Corporate Server 2.1 + MandrakeSoft Linux Mandrake 9.0 + MandrakeSoft Multi Network Firewall 2.0 + S.u.S.E. Linux Personal 8.2 Easy Software Products CUPS 1.1.17 + RedHat Desktop 3.0 + RedHat Enterprise Linux AS 3 + RedHat Enterprise Linux ES 3 + RedHat Enterprise Linux WS 3 Easy Software Products CUPS 1.1.16 + MandrakeSoft Linux Mandrake 9.0 Easy Software Products CUPS 1.1.15 + Conectiva Linux Enterprise Edition 1.0 + S.u.S.E. Linux 8.1 Easy Software Products CUPS 1.1.14 + Conectiva Linux 8.0 + Debian Linux 3.0 sparc + Debian Linux 3.0 s/390 + Debian Linux 3.0 ppc + Debian Linux 3.0 mipsel + Debian Linux 3.0 mips + Debian Linux 3.0 m68k + Debian Linux 3.0 ia-64 + Debian Linux 3.0 ia-32 + Debian Linux 3.0 hppa + Debian Linux 3.0 arm + Debian Linux 3.0 alpha + Debian Linux 3.0 + MandrakeSoft Linux Mandrake 8.2 ppc + MandrakeSoft Linux Mandrake 8.2 Easy Software Products CUPS 1.1.13 Easy Software Products CUPS 1.1.12 + S.u.S.E. Linux 8.0 i386 + S.u.S.E. Linux 8.0 Easy Software Products CUPS 1.1.10 + Caldera OpenLinux Server 3.1.1 + Caldera OpenLinux Workstation 3.1.1 + Conectiva Linux 7.0 + Conectiva Linux 6.0 + MandrakeSoft Linux Mandrake 8.1 ia64 + MandrakeSoft Linux Mandrake 8.1 + S.u.S.E. Linux 7.3 sparc + S.u.S.E. Linux 7.3 ppc + S.u.S.E. Linux 7.3 i386 Easy Software Products CUPS 1.1.7 Easy Software Products CUPS 1.1.6 + Caldera OpenLinux Server 3.1 + Caldera OpenLinux Workstation 3.1 + MandrakeSoft Linux Mandrake 8.0 ppc + MandrakeSoft Linux Mandrake 8.0 + S.u.S.E. Linux 7.2 i386 + S.u.S.E. Linux 7.1 x86 + S.u.S.E. Linux 7.1 sparc + S.u.S.E. Linux 7.1 ppc + S.u.S.E. Linux 7.1 alpha Easy Software Products CUPS 1.1.4 -5 Easy Software Products CUPS 1.1.4 -3 + MandrakeSoft Linux Mandrake 7.2 Easy Software Products CUPS 1.1.4 -2 + Debian Linux 2.3 Easy Software Products CUPS 1.1.4 + Debian Linux 2.3 + MandrakeSoft Linux Mandrake 7.2 Easy Software Products CUPS 1.1.1 + RedHat PowerTools 7.0 Easy Software Products CUPS 1.0.4 -8 + Debian Linux 2.2 Easy Software Products CUPS 1.0.4 + Debian Linux 2.2 DrPhibez and Nitro187 Guild FTPD 1.1.19 rc5 可参考如下补丁信息: Easy Software Products CUPS 1.0.4 -8 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.0.4 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.1 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.10 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.12 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.13 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.14 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.15 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.16 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.17 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.18 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> DrPhibez and Nitro187 Guild FTPD 1.1.19 rc5 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.19 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.19 rc5 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.20 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.21 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.22 rc1 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.22 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.23 rc1 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.23 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.4 -5 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.4 -2 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.4 -3 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.4 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.6 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.1.7 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.2.10 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.2.12 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.2.2 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.2.4 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.2.8 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.2.9 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.3.2 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.3.3 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.3.5 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.3.6 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.3.7 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.3.8 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> Easy Software Products CUPS 1.3.9 Easy Software Products str3031.patch <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> id SSV:5079 last seen 2017-11-19 modified 2009-04-21 published 2009-04-21 reporter Root title CUPS '_cupsImageReadTIFF()'整数溢出漏洞 bulletinFamily exploit description BUGTRAQ ID: 34571 CVE(CAN) ID: CVE-2009-0163 Common Unix Printing System(CUPS)是一款通用Unix打印系统,是Unix环境下的跨平台打印解决方案,基于Internet打印协议,提供大多数PostScript和raster打印机服务。 CUPS的_cupsImageReadTIFF()函数在解析TIFF文件时没有正确地验证从文件读取的图形高度参数便将height值用于计算动态堆缓冲区的大小。如果在图像文件中设置了很大的高度值,计算就可能溢出,导致以CUPS服务的权限执行任意代码。 Easy Software Products CUPS < 1.3.10 Debian ------ Debian已经为此发布了一个安全公告(DSA-1773-1)以及相应补丁: DSA-1773-1:New cups packages fix arbitrary code execution 链接:<a href=http://www.debian.org/security/2009/dsa-1773 target=_blank rel=external nofollow>http://www.debian.org/security/2009/dsa-1773</a> 补丁下载: Source archives: <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7.dsc target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7.dsc</a> Size/MD5 checksum: 1092 4203af9c21af4d6918245cd45acb06bb <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7.diff.gz target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7.diff.gz</a> Size/MD5 checksum: 109374 af603a7173c6df4f33b048ffc7115bd8 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7.orig.tar.gz target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7.orig.tar.gz</a> Size/MD5 checksum: 4214272 c9ba33356e5bb93efbcf77b6e142e498 Architecture independent packages: <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4etch7_all.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4etch7_all.deb</a> Size/MD5 checksum: 46244 44171d0a66210c387b6af8448f6d521d <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-common_1.2.7-4etch7_all.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-common_1.2.7-4etch7_all.deb</a> Size/MD5 checksum: 893990 3f5525cb2fc50e8a06352e587737e2dc alpha architecture (DEC Alpha) <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_alpha.deb</a> Size/MD5 checksum: 39294 ced5ae3328348f9d3ae2676353e726bb <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_alpha.deb</a> Size/MD5 checksum: 184844 ecdf10a00e54d73bc9bba1044f42fc22 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_alpha.deb</a> Size/MD5 checksum: 1093362 f5be00bdf1562065aae9ea9fdb6663dc <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_alpha.deb</a> Size/MD5 checksum: 175490 5b2ece54509d960d8a1a3641412937f8 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_alpha.deb</a> Size/MD5 checksum: 86398 7f312dfb4ff21681dff286d99d3896d8 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_alpha.deb</a> Size/MD5 checksum: 1604044 5656d9acd49fba643a50934599675ebc <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_alpha.deb</a> Size/MD5 checksum: 95756 127511aa7fc682dab5e853b608ccba11 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_alpha.deb</a> Size/MD5 checksum: 72988 5da04efb7c621d273910e5f5fe9ec9c1 amd64 architecture (AMD x86_64 (AMD64)) <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_amd64.deb</a> Size/MD5 checksum: 36358 81cea5176eb873a11c89fccd558da98f <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_amd64.deb</a> Size/MD5 checksum: 86462 6c33916f4c531bba16f777f71f772293 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_amd64.deb</a> Size/MD5 checksum: 1576296 724f40dec3726a6d099c97fc3cafb484 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_amd64.deb</a> Size/MD5 checksum: 142530 0e9faa06043e872626093a03fa17292c <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_amd64.deb</a> Size/MD5 checksum: 162692 bd08c8846a95488ec98fea36e105638b <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_amd64.deb</a> Size/MD5 checksum: 1088628 03b7431460c4d52d15f8525c0b01eddf <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_amd64.deb</a> Size/MD5 checksum: 80736 06d9dd7cd306e846e36047a0eb6f0699 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_amd64.deb</a> Size/MD5 checksum: 53046 873a9f887cada29675d76f5c652af7a6 arm architecture (ARM) <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_arm.deb</a> Size/MD5 checksum: 155368 736f7fc1a145dfac7b96ab591b6b9a27 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_arm.deb</a> Size/MD5 checksum: 1026102 492569202623c8e389586e0a651c9b3f <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_arm.deb</a> Size/MD5 checksum: 1569744 19ce598de83cfa70b6a296f38c020478 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_arm.deb</a> Size/MD5 checksum: 78908 a0f4d02f5b163fe6c6e77df98c63e300 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_arm.deb</a> Size/MD5 checksum: 85818 603f3fd2de4599fc6d3e593ba6a44dfb <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_arm.deb</a> Size/MD5 checksum: 35934 d04cdfc9eab65c862c8bd6510c0b22aa <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_arm.deb</a> Size/MD5 checksum: 132042 aafde83137fe0cb0b63cdce0d2bc62cc <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_arm.deb</a> Size/MD5 checksum: 48894 9bc3b3af517020ab3e241dc44af05326 i386 architecture (Intel ia32) <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_i386.deb</a> Size/MD5 checksum: 86874 f26336d906cea5719ec15ba55623eddf <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_i386.deb</a> Size/MD5 checksum: 1547404 0578f2f01cf6619f255b06dcc37d879b <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_i386.deb</a> Size/MD5 checksum: 53198 6370e8f2d3a88f69cae3b4d217405bd7 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_i386.deb</a> Size/MD5 checksum: 79872 966d88b2c851f1a7d67c297313b235b0 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_i386.deb</a> Size/MD5 checksum: 36468 fda5fad3a8104b0c0ca6ab5d18c03bb5 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_i386.deb</a> Size/MD5 checksum: 138274 15b7dd0ac05da741dab120e76cba0e4c <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_i386.deb</a> Size/MD5 checksum: 998516 93de926d94dd735c64a2c803e6720872 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_i386.deb</a> Size/MD5 checksum: 159824 8b8c0a595a4ba37d4794a0d377247fb9 mips architecture (MIPS (Big Endian)) <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_mips.deb</a> Size/MD5 checksum: 150778 d710b63290ea704ebd42090eba65c107 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_mips.deb</a> Size/MD5 checksum: 35964 0b95eb26db8e5aef307af45d0508e2c7 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_mips.deb</a> Size/MD5 checksum: 77146 852fb9411f3a9c75c570b5255b239ca7 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_mips.deb</a> Size/MD5 checksum: 1551962 a7d22ac657ee679cb1898c0dbb3ed7c1 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_mips.deb</a> Size/MD5 checksum: 1098270 d0ed45a370230ea5a772df21bd718973 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_mips.deb</a> Size/MD5 checksum: 57530 668fa4b84cf505ffc086c46c8238fc95 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_mips.deb</a> Size/MD5 checksum: 86970 5a6f44aaebdb33145898d336f9390885 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_mips.deb</a> Size/MD5 checksum: 158896 7b13f748738a1ce0f50cd27c9b052431 mipsel architecture (MIPS (Little Endian)) <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_mipsel.deb</a> Size/MD5 checksum: 87148 4374d53e7d72231b7d95869e9a646d7d <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_mipsel.deb</a> Size/MD5 checksum: 1553638 df97fb63a53afbb5b5cb3db635d2c001 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_mipsel.deb</a> Size/MD5 checksum: 36062 547f0d21badd989fc99ed4a79730a4da <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_mipsel.deb</a> Size/MD5 checksum: 158722 bda554b8ac90a4c5fbea5afd21d9fe16 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_mipsel.deb</a> Size/MD5 checksum: 1086238 be75438a8b89e78918011864aeb1ccd2 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_mipsel.deb</a> Size/MD5 checksum: 150884 ad6a839515c45736ea3cb7e9251fd427 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_mipsel.deb</a> Size/MD5 checksum: 57798 02acf357e72112087b351f205d7e7945 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_mipsel.deb</a> Size/MD5 checksum: 77458 08e101fe325b65121c170a9e3b58a2b7 powerpc architecture (PowerPC) <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_powerpc.deb</a> Size/MD5 checksum: 136872 5d41c0227da9a81a1119fb6e92e65278 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_powerpc.deb</a> Size/MD5 checksum: 41324 4966469b5a194add297465f232fd9ff0 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_powerpc.deb</a> Size/MD5 checksum: 88666 e395634fa76ee6b77f0b28d00688de14 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_powerpc.deb</a> Size/MD5 checksum: 90008 561afd5de88b97d4536b92663a1753b2 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_powerpc.deb</a> Size/MD5 checksum: 51900 6af8ba016b886472b40152d75a05103b <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_powerpc.deb</a> Size/MD5 checksum: 1576806 ea603f4937cb570ac91805aed0da9aca <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_powerpc.deb</a> Size/MD5 checksum: 1144662 5699e8b512dbe453b899dce1b6851138 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_powerpc.deb</a> Size/MD5 checksum: 163390 1e624e1331ca971921573d289636359c s390 architecture (IBM S/390) <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_s390.deb</a> Size/MD5 checksum: 144936 b113d53d52373b603fbd13e6d71e3f35 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_s390.deb</a> Size/MD5 checksum: 37424 50ffaac85c766351ffd600153c815a74 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_s390.deb</a> Size/MD5 checksum: 82344 cafef495eebde8fda2463ceaf0f1fae2 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_s390.deb</a> Size/MD5 checksum: 166894 5a787ff93c3d0f4b9f2fe8fce76c079b <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_s390.deb</a> Size/MD5 checksum: 1587606 22d74c8ad10a70d7e228ecb7ec79b9c8 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_s390.deb</a> Size/MD5 checksum: 52516 7f9260ea6a1098d646f73578fc25908b <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_s390.deb</a> Size/MD5 checksum: 88078 682a40d1a28a38d80a03a0c23f0c788d <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_s390.deb</a> Size/MD5 checksum: 1037346 775f564213a827da9a988d16364eaf39 sparc architecture (Sun SPARC/UltraSPARC) <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch7_sparc.deb</a> Size/MD5 checksum: 1577988 26d3916b7836cf31435862c1293999e5 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch7_sparc.deb</a> Size/MD5 checksum: 51838 d70cb8e4492a4c2f35dbe594d7d6ab98 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch7_sparc.deb</a> Size/MD5 checksum: 996734 bee6e79ee624e7ef4cee635b03bcaa31 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch7_sparc.deb</a> Size/MD5 checksum: 159594 86f645f83507d10b1d0496724bceb5b0 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch7_sparc.deb</a> Size/MD5 checksum: 78594 dac07ba42566d31bdb9e71e15e37f248 <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch7_sparc.deb</a> Size/MD5 checksum: 138738 d502a45d67b3398aaac1e3d3ef47134d <a href=http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch7_sparc.deb</a> Size/MD5 checksum: 85948 9a7450a17da56ed2ae6dd39762fb19c9 <a href=http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch7_sparc.deb</a> Size/MD5 checksum: 36060 dfcde37f21036a597065ff4b56dd306d Debian GNU/Linux 5.0 alias lenny - -------------------------------- Debian (stable) - --------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5.dsc target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5.dsc</a> Size/MD5 checksum: 1833 4c8778e239a30fb22d2f183c32c698f9 <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8.orig.tar.gz target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8.orig.tar.gz</a> Size/MD5 checksum: 4796827 10efe9825c1a1dcd325be47a6cc21faf <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5.diff.gz target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5.diff.gz</a> Size/MD5 checksum: 184239 dd404146b1e9f016cc820f7892ed17c7 Architecture independent packages: <a href=http://security.debian.org/pool/updates/main/c/cups/cupsys-dbg_1.3.8-1lenny5_all.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cupsys-dbg_1.3.8-1lenny5_all.deb</a> Size/MD5 checksum: 52046 19e750bfebc597b8936ae1d23a38b2ee <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsys2-dev_1.3.8-1lenny5_all.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsys2-dev_1.3.8-1lenny5_all.deb</a> Size/MD5 checksum: 52060 baf9cc46db611665cb4a36c043a809e4 <a href=http://security.debian.org/pool/updates/main/c/cups/cupsys-bsd_1.3.8-1lenny5_all.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cupsys-bsd_1.3.8-1lenny5_all.deb</a> Size/MD5 checksum: 52054 7b1cbcef31f0acef816e190274d4cd73 <a href=http://security.debian.org/pool/updates/main/c/cups/cupsys-common_1.3.8-1lenny5_all.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cupsys-common_1.3.8-1lenny5_all.deb</a> Size/MD5 checksum: 52058 2b8c19ea46398861298325493814b2bc <a href=http://security.debian.org/pool/updates/main/c/cups/cups-common_1.3.8-1lenny5_all.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-common_1.3.8-1lenny5_all.deb</a> Size/MD5 checksum: 1175160 462411771388eea81dcd9fe87fcadb76 <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsys2_1.3.8-1lenny5_all.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsys2_1.3.8-1lenny5_all.deb</a> Size/MD5 checksum: 52048 da9cfa78d4fccba4d4587186e4e91583 <a href=http://security.debian.org/pool/updates/main/c/cups/cupsys_1.3.8-1lenny5_all.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cupsys_1.3.8-1lenny5_all.deb</a> Size/MD5 checksum: 52032 57858f41f804dcef4a205c71c8fafeb9 <a href=http://security.debian.org/pool/updates/main/c/cups/cupsys-client_1.3.8-1lenny5_all.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cupsys-client_1.3.8-1lenny5_all.deb</a> Size/MD5 checksum: 52056 fad269c06612a3e92372fb572997a75a alpha architecture (DEC Alpha) <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_alpha.deb</a> Size/MD5 checksum: 107812 9827d33dd669899c6cf507790d8f6bb3 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_alpha.deb</a> Size/MD5 checksum: 1139012 500dac788469d8a0daf3c01183298fa0 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_alpha.deb</a> Size/MD5 checksum: 37814 07beee6caf1c88be556347fb50886d69 <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_alpha.deb</a> Size/MD5 checksum: 2089068 ecee5dbe0e6c581e846a0a56429eb931 <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_alpha.deb</a> Size/MD5 checksum: 441552 22608af1ebd84479c28a8945d8705c74 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_alpha.deb</a> Size/MD5 checksum: 119304 efd9ca03e7811c3f1691ed2686aab395 <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_alpha.deb</a> Size/MD5 checksum: 179132 9d6e0cc2c524fdab73327f039ba11dcd <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_alpha.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_alpha.deb</a> Size/MD5 checksum: 81544 527042207cf23298fe2a728dcfd0b8bd amd64 architecture (AMD x86_64 (AMD64)) <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_amd64.deb</a> Size/MD5 checksum: 99738 5900c1a673a43f0f062d017a06a2d207 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_amd64.deb</a> Size/MD5 checksum: 116248 14d66add2b6643e6877f5d4081349bbb <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_amd64.deb</a> Size/MD5 checksum: 167696 fcace181c86f8e192975e0d14405c18c <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_amd64.deb</a> Size/MD5 checksum: 61028 fae73a402bdfb574cd9dbdca629af8a3 <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_amd64.deb</a> Size/MD5 checksum: 2067958 5ca93103c3991220029c271281c6cc53 <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_amd64.deb</a> Size/MD5 checksum: 400648 aa4ee61e764ca9788998b83bf9c8450f <a href=http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_amd64.deb</a> Size/MD5 checksum: 1202144 68786a74a8313af5e2f2cc8c0b09cd59 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_amd64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_amd64.deb</a> Size/MD5 checksum: 37344 c73825d780ef41df8dd523e49dc54610 arm architecture (ARM) <a href=http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_arm.deb</a> Size/MD5 checksum: 1123300 557de9bd954039759021cdd653a885b0 <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_arm.deb</a> Size/MD5 checksum: 55346 89e8b82c7500198e118a52d7be63e520 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_arm.deb</a> Size/MD5 checksum: 113174 9678ff00559e3421d326772bd24e47ab <a href=http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_arm.deb</a> Size/MD5 checksum: 36472 e334b43b50170f78ddd2196bae49cfde <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_arm.deb</a> Size/MD5 checksum: 97092 39bfb5fb8b244033b8b1ab9b4c461a9e <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_arm.deb</a> Size/MD5 checksum: 387380 1521df5af20b47a06dfe901081e496e4 <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_arm.deb</a> Size/MD5 checksum: 2058812 703c4d4d555001f4b9378ff42d286ad8 <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_arm.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_arm.deb</a> Size/MD5 checksum: 155172 2da281a3625527e9a1f64ea13440d6e1 armel architecture (ARM EABI) <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_armel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_armel.deb</a> Size/MD5 checksum: 157462 251d9966100467253068527bf3dd4884 <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_armel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_armel.deb</a> Size/MD5 checksum: 2082936 095917cf06f73de1700c923859bc6186 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_armel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_armel.deb</a> Size/MD5 checksum: 117950 9acc5533034d20e8e5eb34759abeff8f <a href=http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_armel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_armel.deb</a> Size/MD5 checksum: 1131278 96e266e10e8062cf607a85d9bfb755b9 <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_armel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_armel.deb</a> Size/MD5 checksum: 98158 148e0a5d454735f799d8aa0033f19b0c <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_armel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_armel.deb</a> Size/MD5 checksum: 386342 2b6c689f6cc9fa89cece3a0c82b5b734 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_armel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_armel.deb</a> Size/MD5 checksum: 37658 85d79d5a990b1cac0c272e1604edbae6 <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_armel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_armel.deb</a> Size/MD5 checksum: 55026 61cb844134cad2fc5e65719ab835d5a3 hppa architecture (HP PA RISC) <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_hppa.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_hppa.deb</a> Size/MD5 checksum: 102902 806736c35feec38da0bfdfc0c23844cc <a href=http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_hppa.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_hppa.deb</a> Size/MD5 checksum: 38148 c7c3d1c5ae4ad0358b17327f6ef4bbd4 <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_hppa.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_hppa.deb</a> Size/MD5 checksum: 63122 3d44247130b5797f289b88a5afbc88b1 <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_hppa.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_hppa.deb</a> Size/MD5 checksum: 172484 80fe8fef733bca1192084e96e4342d2e <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_hppa.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_hppa.deb</a> Size/MD5 checksum: 2116308 8f1f71be20fe6167f4f3884841f902d6 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_hppa.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_hppa.deb</a> Size/MD5 checksum: 119834 b4f92925d2fd5562844999f57a9e85d4 <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_hppa.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_hppa.deb</a> Size/MD5 checksum: 408888 e23953c8c1ecfeca8933cd89ab39fb63 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_hppa.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_hppa.deb</a> Size/MD5 checksum: 1137570 f98e5e9764760fcd3d03a117a82d5114 i386 architecture (Intel ia32) <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_i386.deb</a> Size/MD5 checksum: 394064 07dcad9401a227e62ac1d4e2d15bba4e <a href=http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_i386.deb</a> Size/MD5 checksum: 36484 9dbfecd141e6674f8c4c12a7cc472e6e <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_i386.deb</a> Size/MD5 checksum: 60434 8c4f67ff8e3163e1aa24053c4f746a37 <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_i386.deb</a> Size/MD5 checksum: 164434 8a9cc5328a01e96fb99a5c8dd7790626 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_i386.deb</a> Size/MD5 checksum: 114848 a4aed79f9fd271ca06be97fdd0c9097b <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_i386.deb</a> Size/MD5 checksum: 2047160 55f3b312558a1687931b74f55ef81dee <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_i386.deb</a> Size/MD5 checksum: 99120 5ea77d549d9e0d8ca64a6bdce863b262 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_i386.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_i386.deb</a> Size/MD5 checksum: 1085470 6b05ce29e166358a0e33c440baf8a0eb ia64 architecture (Intel ia64) <a href=http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_ia64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_ia64.deb</a> Size/MD5 checksum: 139094 d83b44753709a37f7369d30f7c4e3dd6 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_ia64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_ia64.deb</a> Size/MD5 checksum: 41278 0764cbd059c3b5788d0d4b15e951d37a <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_ia64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_ia64.deb</a> Size/MD5 checksum: 123298 582063fb030b59c10fc63697565fd5f4 <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_ia64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_ia64.deb</a> Size/MD5 checksum: 208944 2f54be25c1a99e574c6b34bcb8168139 <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_ia64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_ia64.deb</a> Size/MD5 checksum: 447250 c0962041ae7bc9c479e4d7918f83a4b3 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_ia64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_ia64.deb</a> Size/MD5 checksum: 1149208 2f3dc846e508a9b73324a992990b8211 <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_ia64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_ia64.deb</a> Size/MD5 checksum: 86012 18608e0c06348e42c6ec026c8ae7df1b <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_ia64.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_ia64.deb</a> Size/MD5 checksum: 2281350 b6f604d2d4c5fca17487d00deb686a47 mips architecture (MIPS (Big Endian)) <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_mips.deb</a> Size/MD5 checksum: 98564 aadb6e93579960e565df5a18a1aceabc <a href=http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_mips.deb</a> Size/MD5 checksum: 108490 4fd40245789c857a1bd1bcde1786a852 <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_mips.deb</a> Size/MD5 checksum: 2047262 2fe9d6fc13eac81bdc6cf2407e8e4ceb <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_mips.deb</a> Size/MD5 checksum: 65288 d321bcf5493754afa601cbc344880a91 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_mips.deb</a> Size/MD5 checksum: 36022 fea292710b43c8258f9b6a3819ed6ca2 <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_mips.deb</a> Size/MD5 checksum: 405434 489e35881d4f007854d9610f075ade1c <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_mips.deb</a> Size/MD5 checksum: 157718 a3a3e679a6a937417894d9b3c297ece7 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_mips.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_mips.deb</a> Size/MD5 checksum: 1170706 9f9c04f5a6aa2b12e333070c2ccd17c9 mipsel architecture (MIPS (Little Endian)) <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_mipsel.deb</a> Size/MD5 checksum: 403046 77bae5abe1193c751c95addcaed813f6 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_mipsel.deb</a> Size/MD5 checksum: 1155908 a15bc32ece30cf1a7aa83e9ee79feb14 <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_mipsel.deb</a> Size/MD5 checksum: 2028048 3a651bbf76860fff0ec9effca3670e6a <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_mipsel.deb</a> Size/MD5 checksum: 158180 2360289a2cef190bee1e4d1d87ade60d <a href=http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_mipsel.deb</a> Size/MD5 checksum: 36144 e3d852f522af032d23f30cc966afbb49 <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_mipsel.deb</a> Size/MD5 checksum: 65220 dc0dae4e3a62acf8ee01e78b57260df3 <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_mipsel.deb</a> Size/MD5 checksum: 98658 3ddad5f6aada2583031306456693f238 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_mipsel.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_mipsel.deb</a> Size/MD5 checksum: 109970 51e58d9d80b625c46dd174e973a68ed1 powerpc architecture (PowerPC) <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_powerpc.deb</a> Size/MD5 checksum: 2121876 5d1efb03d5bc0ad0f4696ddac30ae146 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_powerpc.deb</a> Size/MD5 checksum: 1189254 dc75c16994fbd0b77bdec45b3e7dd0bb <a href=http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_powerpc.deb</a> Size/MD5 checksum: 136088 b755acec71976f62df99ba5d371801fc <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_powerpc.deb</a> Size/MD5 checksum: 61144 891c52ce51da7a4fba78da2c93a18686 <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_powerpc.deb</a> Size/MD5 checksum: 394002 7cc208d17bf4cc4f0f241873a8cf7da1 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_powerpc.deb</a> Size/MD5 checksum: 44222 4463b36153fbef74ac4076c57c38840b <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_powerpc.deb</a> Size/MD5 checksum: 174122 e5efc8b9432416897aca0204c7f01676 <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_powerpc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_powerpc.deb</a> Size/MD5 checksum: 104598 9c5d0eb2e656980656973276dc3affc0 s390 architecture (IBM S/390) <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_s390.deb</a> Size/MD5 checksum: 171442 8e5a52ad2952931a74fa270b6934638c <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_s390.deb</a> Size/MD5 checksum: 101384 e8b6b9b4bb117bcf856f61e41166d5e4 <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_s390.deb</a> Size/MD5 checksum: 2090430 141fd5fbb9eece6a3b312d21871b22db <a href=http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_s390.deb</a> Size/MD5 checksum: 37812 dfaf79a24a794c91aabcaeb2921d11da <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_s390.deb</a> Size/MD5 checksum: 399542 f9e634c34bcf7203fd17e811e96c9441 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_s390.deb</a> Size/MD5 checksum: 1188034 d74e382cd278d744ef69fcabdc5aa938 <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_s390.deb</a> Size/MD5 checksum: 60712 0df38401da1b0dc6277144f9b8965354 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_s390.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_s390.deb</a> Size/MD5 checksum: 118608 fb635dd413f8756c91e22745b7d3af22 sparc architecture (Sun SPARC/UltraSPARC) <a href=http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-client_1.3.8-1lenny5_sparc.deb</a> Size/MD5 checksum: 115134 519fc7e05ce934ff21d0bfec0ae98bd0 <a href=http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups_1.3.8-1lenny5_sparc.deb</a> Size/MD5 checksum: 2062158 3fab14e9340801ccbd8cba85b023f5fe <a href=http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-bsd_1.3.8-1lenny5_sparc.deb</a> Size/MD5 checksum: 37020 34e6d2056a8b1ef3a060849eba2412b7 <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2-dev_1.3.8-1lenny5_sparc.deb</a> Size/MD5 checksum: 390700 e50f922e87278223fc66c9ff189efe02 <a href=http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcups2_1.3.8-1lenny5_sparc.deb</a> Size/MD5 checksum: 160894 2493bfe07de7cbe5206abe824dc8fb37 <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2-dev_1.3.8-1lenny5_sparc.deb</a> Size/MD5 checksum: 57660 2e3c5ad6cb52420d20f0a42a0c4085b7 <a href=http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/cups-dbg_1.3.8-1lenny5_sparc.deb</a> Size/MD5 checksum: 1052778 bb27f2fb553e314d5e23abe09d8e479c <a href=http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_sparc.deb target=_blank rel=external nofollow>http://security.debian.org/pool/updates/main/c/cups/libcupsimage2_1.3.8-1lenny5_sparc.deb</a> Size/MD5 checksum: 96968 e5f8123f31b9c9fe63417a12fa1d79b4 补丁安装方法: 1. 手工安装补丁包: 首先,使用下面的命令来下载补丁软件: # wget url (url是补丁下载链接地址) 然后,使用下面的命令来安装补丁: # dpkg -i file.deb (file是相应的补丁名) 2. 使用apt-get自动安装补丁包: 首先,使用下面的命令更新内部数据库: # apt-get update 然后,使用下面的命令安装更新软件包: # apt-get upgrade Easy Software Products ---------------------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=http://www.cups.org/strfiles/3031/str3031.patch target=_blank rel=external nofollow>http://www.cups.org/strfiles/3031/str3031.patch</a> RedHat ------ RedHat已经为此发布了一个安全公告(RHSA-2009:0428-01)以及相应补丁: RHSA-2009:0428-01:Moderate: cups security update 链接:<a href=https://www.redhat.com/support/errata/RHSA-2009-0428.html target=_blank rel=external nofollow>https://www.redhat.com/support/errata/RHSA-2009-0428.html</a> id SSV:5068 last seen 2017-11-19 modified 2009-04-18 published 2009-04-18 reporter Root title CUPS _cupsImageReadTIFF()函数整数溢出漏洞
References
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html
- http://secunia.com/advisories/34481
- http://secunia.com/advisories/34722
- http://secunia.com/advisories/34747
- http://secunia.com/advisories/34756
- http://secunia.com/advisories/34852
- http://security.gentoo.org/glsa/glsa-200904-20.xml
- http://wiki.rpath.com/Advisories:rPSA-2009-0061
- http://www.cups.org/articles.php?L582
- http://www.cups.org/str.php?L3031
- http://www.debian.org/security/2009/dsa-1773
- http://www.redhat.com/support/errata/RHSA-2009-0428.html
- http://www.redhat.com/support/errata/RHSA-2009-0429.html
- http://www.securityfocus.com/archive/1/502750/100/0/threaded
- http://www.securityfocus.com/bid/34571
- http://www.securitytracker.com/id?1022070
- http://www.ubuntu.com/usn/usn-760-1
- https://bugzilla.redhat.com/show_bug.cgi?id=490596
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11546