Vulnerabilities > CVE-2015-1158 - 7PK - Security Features vulnerability in Cups

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
cups
CWE-254
nessus
exploit available

Summary

The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2) IPP_PRINT_JOB request, as demonstrated by replacing the configuration file and consequently executing arbitrary code.

Vulnerable Configurations

Part Description Count
Application
Cups
147

Common Weakness Enumeration (CWE)

Exploit-Db

  • descriptionCUPS < 2.0.3 - Remote Command Execution. CVE-2015-1158. Remote exploit for Linux platform
    fileexploits/linux/remote/41233.py
    idEDB-ID:41233
    last seen2017-02-03
    modified2017-02-03
    platformlinux
    port
    published2017-02-03
    reporterExploit-DB
    sourcehttps://www.exploit-db.com/download/41233/
    titleCUPS < 2.0.3 - Remote Command Execution
    typeremote
  • descriptionCUPS < 2.0.3 - Multiple Vulnerabilities. CVE-2015-1158. Remote exploits for multiple platform
    fileexploits/multiple/remote/37336.txt
    idEDB-ID:37336
    last seen2016-02-04
    modified2015-06-22
    platformmultiple
    port
    published2015-06-22
    reporterGoogle Security Research
    sourcehttps://www.exploit-db.com/download/37336/
    titleCUPS < 2.0.3 - Multiple Vulnerabilities
    typeremote

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-9726.NASL
    descriptionNew upstream bug-fix release. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-06-22
    plugin id84310
    published2015-06-22
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84310
    titleFedora 22 : cups-2.0.3-1.fc22 (2015-9726)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20150617_CUPS_ON_SL6_X.NASL
    descriptionA string reference count bug was found in cupsd, causing premature freeing of string objects. An attacker can submit a malicious print job that exploits this flaw to dismantle ACLs protecting privileged operations, allowing a replacement configuration file to be uploaded which in turn allows the attacker to run arbitrary code in the CUPS server (CVE-2015-1158) A cross-site scripting flaw was found in the cups web templating engine. An attacker could use this flaw to bypass the default configuration settings that bind the CUPS scheduler to the
    last seen2020-03-18
    modified2015-06-18
    plugin id84259
    published2015-06-18
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84259
    titleScientific Linux Security Update : cups on SL6.x, SL7.x i386/x86_64 (20150617)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2015-1123.NASL
    descriptionFrom Red Hat Security Advisory 2015:1123 : Updated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. A string reference count bug was found in cupsd, causing premature freeing of string objects. An attacker can submit a malicious print job that exploits this flaw to dismantle ACLs protecting privileged operations, allowing a replacement configuration file to be uploaded which in turn allows the attacker to run arbitrary code in the CUPS server (CVE-2015-1158) A cross-site scripting flaw was found in the cups web templating engine. An attacker could use this flaw to bypass the default configuration settings that bind the CUPS scheduler to the
    last seen2020-06-01
    modified2020-06-02
    plugin id84256
    published2015-06-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84256
    titleOracle Linux 6 / 7 : cups (ELSA-2015-1123)
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-418.NASL
    descriptionThis update fixes the following issues : - CVE-2015-1158 and CVE-2015-1159 fixes a possible privilege escalation via cross-site scripting and bad print job submission used to replace cupsd.conf on server (CUPS STR#4609 CERT-VU-810572 CVE-2015-1158 CVE-2015-1159 bugzilla.suse.com bsc#924208). In general it is crucial to limit access to CUPS to trustworthy users who do not misuse their permission to submit print jobs which means to upload arbitrary data onto the CUPS server, see https://en.opensuse.org/SDB:CUPS_and_SANE_Firewall_setti ngs and cf. the entries about CVE-2012-5519 below.
    last seen2020-06-05
    modified2015-06-15
    plugin id84184
    published2015-06-15
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84184
    titleopenSUSE Security Update : cups (openSUSE-2015-418)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_A40EC9700EFA11E590E4D050996490D0.NASL
    descriptionCUPS development team reports : The new release addresses two security vulnerabilities, add localizations for German and Russian, and includes several general bug fixes. Changes include : Security: Fixed CERT VU #810572/CVE-2015-1158/CVE-2015-1159 exploiting the dynamic linker (STR #4609) Security: The scheduler could hang with malformed gzip data (STR #4602)
    last seen2020-06-01
    modified2020-06-02
    plugin id84070
    published2015-06-10
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84070
    titleFreeBSD : cups -- multiple vulnerabilities (a40ec970-0efa-11e5-90e4-d050996490d0)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-239.NASL
    descriptionTwo critical vulnerabilities have been found in the CUPS printing system : CVE-2015-1158 - Improper Update of Reference Count Cupsd uses reference-counted strings with global scope. When parsing a print job request, cupsd over-decrements the reference count for a string from the request. As a result, an attacker can prematurely free an arbitrary string of global scope. They can use this to dismantle ACL&rsquo;s protecting privileged operations, and upload a replacement configuration file, and subsequently run arbitrary code on a target machine. This bug is exploitable in default configurations, and does not require any special permissions other than the basic ability to print. CVE-2015-1159 - Cross-Site Scripting A cross-site scripting bug in the CUPS templating engine allows the above bug to be exploited when a user browses the web. This XSS is reachable in the default configuration for Linux instances of CUPS, and allows an attacker to bypass default configuration settings that bind the CUPS scheduler to the &lsquo;localhost&rsquo; or loopback interface. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-17
    modified2015-06-10
    plugin id84061
    published2015-06-10
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84061
    titleDebian DLA-239-1 : cups security update
  • NASL familyMisc.
    NASL idCUPS_2_0_3.NASL
    descriptionAccording to its banner, the CUPS printer service running on the remote host is a version prior to 2.0.3. It is, therefore, potentially affected by the following vulnerabilities : - A privilege escalation vulnerability exists due to a flaw in cupsd when handling printer job request errors. An unauthenticated, remote attacker can exploit this, with a specially crafted request, to prematurely free an arbitrary string of global scope, creating a dangling pointer to a repurposed block of memory on the heap, resulting ACL verification to fail when parsing
    last seen2020-06-01
    modified2020-06-02
    plugin id84149
    published2015-06-12
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84149
    titleCUPS < 2.0.3 Multiple Vulnerabilities
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2015-188-01.NASL
    descriptionNew cups packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id84588
    published2015-07-08
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84588
    titleSlackware 13.0 / 13.1 / 13.37 / 14.0 / 14.1 / current : cups (SSA:2015-188-01)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2015-1123.NASL
    descriptionUpdated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. A string reference count bug was found in cupsd, causing premature freeing of string objects. An attacker can submit a malicious print job that exploits this flaw to dismantle ACLs protecting privileged operations, allowing a replacement configuration file to be uploaded which in turn allows the attacker to run arbitrary code in the CUPS server (CVE-2015-1158) A cross-site scripting flaw was found in the cups web templating engine. An attacker could use this flaw to bypass the default configuration settings that bind the CUPS scheduler to the
    last seen2020-06-01
    modified2020-06-02
    plugin id84258
    published2015-06-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84258
    titleRHEL 6 / 7 : cups (RHSA-2015:1123)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2015-9801.NASL
    descriptionThis update fixed 2 security flaws. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-05
    modified2015-06-22
    plugin id84311
    published2015-06-22
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84311
    titleFedora 21 : cups-1.7.5-17.fc21 (2015-9801)
  • NASL familyOracleVM Local Security Checks
    NASL idORACLEVM_OVMSA-2015-0071.NASL
    descriptionThe remote OracleVM system is missing necessary patches to address critical security updates : - CVE-2015-1158, CVE-2015-1159, CVE-2014-9679 (bug #1229982).
    last seen2020-06-01
    modified2020-06-02
    plugin id84257
    published2015-06-18
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84257
    titleOracleVM 3.3 : cups (OVMSA-2015-0071)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1041-1.NASL
    descriptionThe following issues are fixed by this update : - CVE-2012-5519: privilege escalation via cross-site scripting and bad print job submission used to replace cupsd.conf on server (bsc#924208). - CVE-2015-1158: Improper Update of Reference Count - CVE-2015-1159: Cross-Site Scripting Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id84145
    published2015-06-12
    reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84145
    titleSUSE SLED12 / SLES12 Security Update : cups (SUSE-SU-2015:1041-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3283.NASL
    descriptionIt was discovered that CUPS, the Common UNIX Printing System, is vulnerable to a remotely triggerable privilege escalation via cross-site scripting and bad print job submission used to replace cupsd.conf on the CUPS server.
    last seen2020-06-01
    modified2020-06-02
    plugin id84063
    published2015-06-10
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84063
    titleDebian DSA-3283-1 : cups - security update
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-2629-1.NASL
    descriptionIt was discovered that CUPS incorrectly handled reference counting when handling localized strings. A remote attacker could use this issue to escalate permissions, upload a replacement CUPS configuration file, and execute arbitrary code. (CVE-2015-1158) It was discovered that the CUPS templating engine contained a cross-site scripting issue. A remote attacker could use this issue to bypass default configuration settings. (CVE-2015-1159). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id84117
    published2015-06-11
    reporterUbuntu Security Notice (C) 2015-2019 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84117
    titleUbuntu 12.04 LTS / 14.04 LTS / 14.10 / 15.04 : cups vulnerabilities (USN-2629-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1044-2.NASL
    descriptionThe following issues are fixed by this update : - CVE-2012-5519: privilege escalation via cross-site scripting and bad print job submission used to replace cupsd.conf on server (bsc#924208). - CVE-2015-1158: Improper Update of Reference Count - CVE-2015-1159: Cross-Site Scripting Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-24
    modified2019-01-02
    plugin id119966
    published2019-01-02
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/119966
    titleSUSE SLES12 Security Update : cups154 (SUSE-SU-2015:1044-2)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2015-1123.NASL
    descriptionUpdated cups packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. A string reference count bug was found in cupsd, causing premature freeing of string objects. An attacker can submit a malicious print job that exploits this flaw to dismantle ACLs protecting privileged operations, allowing a replacement configuration file to be uploaded which in turn allows the attacker to run arbitrary code in the CUPS server (CVE-2015-1158) A cross-site scripting flaw was found in the cups web templating engine. An attacker could use this flaw to bypass the default configuration settings that bind the CUPS scheduler to the
    last seen2020-06-01
    modified2020-06-02
    plugin id84276
    published2015-06-19
    reporterThis script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84276
    titleCentOS 6 / 7 : cups (CESA-2015:1123)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2015-1044-1.NASL
    descriptionThe following issues are fixed by this update : - CVE-2012-5519: privilege escalation via cross-site scripting and bad print job submission used to replace cupsd.conf on server (bsc#924208). - CVE-2015-1158: Improper Update of Reference Count - CVE-2015-1159: Cross-Site Scripting Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-03-24
    modified2019-01-02
    plugin id119965
    published2019-01-02
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/119965
    titleSUSE SLES12 Security Update : cups154 (SUSE-SU-2015:1044-1)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201510-07.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201510-07 (CUPS: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in cups. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly execute arbitrary code with the privileges of the process, or cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id86692
    published2015-11-02
    reporterThis script is Copyright (C) 2015 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86692
    titleGLSA-201510-07 : CUPS: Multiple vulnerabilities
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2015-559.NASL
    descriptionA string reference count bug was found in cupsd, causing premature freeing of string objects. An attacker can submit a malicious print job that exploits this flaw to dismantle ACLs protecting privileged operations, allowing a replacement configuration file to be uploaded which in turn allows the attacker to run arbitrary code in the CUPS server (CVE-2015-1158) A cross-site scripting flaw was found in the cups web templating engine. An attacker could use this flaw to bypass the default configuration settings that bind the CUPS scheduler to the
    last seen2020-06-01
    modified2020-06-02
    plugin id84595
    published2015-07-08
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84595
    titleAmazon Linux AMI : cups (ALAS-2015-559)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1432.NASL
    descriptionAccording to the versions of the cups package installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - A cross-site scripting flaw was found in the cups web templating engine. An attacker could use this flaw to bypass the default configuration settings that bind the CUPS scheduler to the
    last seen2020-06-01
    modified2020-06-02
    plugin id124935
    published2019-05-14
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124935
    titleEulerOS Virtualization 3.0.1.0 : cups (EulerOS-SA-2019-1432)

Packetstorm

Redhat

advisories
rhsa
idRHSA-2015:1123
rpms
  • cups-1:1.4.2-67.el6_6.1
  • cups-1:1.6.3-17.ael7b_1.1
  • cups-1:1.6.3-17.el7_1.1
  • cups-client-1:1.6.3-17.ael7b_1.1
  • cups-client-1:1.6.3-17.el7_1.1
  • cups-debuginfo-1:1.4.2-67.el6_6.1
  • cups-debuginfo-1:1.6.3-17.ael7b_1.1
  • cups-debuginfo-1:1.6.3-17.el7_1.1
  • cups-devel-1:1.4.2-67.el6_6.1
  • cups-devel-1:1.6.3-17.ael7b_1.1
  • cups-devel-1:1.6.3-17.el7_1.1
  • cups-filesystem-1:1.6.3-17.ael7b_1.1
  • cups-filesystem-1:1.6.3-17.el7_1.1
  • cups-ipptool-1:1.6.3-17.ael7b_1.1
  • cups-ipptool-1:1.6.3-17.el7_1.1
  • cups-libs-1:1.4.2-67.el6_6.1
  • cups-libs-1:1.6.3-17.ael7b_1.1
  • cups-libs-1:1.6.3-17.el7_1.1
  • cups-lpd-1:1.4.2-67.el6_6.1
  • cups-lpd-1:1.6.3-17.ael7b_1.1
  • cups-lpd-1:1.6.3-17.el7_1.1
  • cups-php-1:1.4.2-67.el6_6.1