[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200307221910.QAA01807@frajuto.distro.conectiva>
Date: Tue, 22 Jul 2003 16:10:21 -0300
From: Conectiva Updates <secure@...ectiva.com.br>
To: conectiva-updates@...aleguas.conectiva.com.br, lwn@....net,
bugtraq@...urityfocus.com, security-alerts@...uxsecurity.com,
linsec@...ts.seifried.org
Subject: [CLA-2003:702] Conectiva Security Announcement - cups
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- --------------------------------------------------------------------------
PACKAGE : cups
SUMMARY : Several vulnerabilities
DATE : 2003-07-22 16:08:00
ID : CLA-2003:702
RELEVANT
RELEASES : 7.0, 8, 9
- -------------------------------------------------------------------------
DESCRIPTION
Cups[1] (Common UNIX Printing System) is an open-source, freely
available and cross-platform printing solution for UNIX
environments.
iDefense published[2][3] some time ago several vulnerabilities in
Cups researched by zen-parse which are being addressed now.
Additionally, a new denial of service vulnerability[12] was
discovered by Phil D'Amore of Red Hat and is also being fixed.
The vulnerabilities outlined below affect only Conectiva Linux 7.0
and 8 (CL9 is not affected):
1. pdftops integer overflow (CAN-2002-1384)[3][4]
The pdftops filter used in Cups contains an integer overflow which
can be exploited to run arbitrary commands with the privileges of the
target user.
2. Multiple integer overflows (CAN-2002-1383)[5]
There are several integer overflows in Cups which can be exploited
via the http interface and via carefully created images which get
handled by Cups. These vulnerabilities can be exploited to run
arbitrary code.
3. Race condition (CAN-2002-1366)[6]
A race condition exists in the creation of /etc/cups/certs/<pid>.
This allows a local attacker to create or overwrite any file as root
as long as he/she already has 'lp' privileges (which could be
obtained via one of the previous vulnerabilities, for example).
4. Arbitrary printer creation and Root Certificate Design Flaw
(CAN-2002-1367)[7]
Remote users can add arbitrary printers to Cups by sending a
specially crafted UDP packet. Attackers can use this to add printers
with tainted names that, when clicked on in the web administration
page, could be used to exploit other vulnerabilities.
5. Negative Length Memcpy() Calls (CAN-2002-1368)[8]
Negative length memcpy() calls in the code which handles chunked
transfer encodings and content length in the http interface could be
used by remote attackers to cause a denial of service condition and
possibly execute arbitrary code.
6. Unsafe Strncat Function Call in jobs.c (CAN-2002-1369)[9]
There is a buffer overflow vulnerability in the code used to handle
job options which, in conjuntion with other vulnerabilities, could be
used to obtain root privileges.
7. Zero Width Images in filters/image-gif.c (CAN-2002-1371)[10]
Cups does not properly check for zero-length GIF images, which allows
remote attackers to execute arbitrary code.
8. File Descriptor Resource Leaks (CAN-2002-1372)[11]
Cups does not properly check the return values of various file and
socket operations, which could allow a remote attacker to cause a
denial of service condition by causing file descriptors to be
assigned and not released.
The vulnerability below affects Conectiva Linux 7.0, 8 and 9:
9. Denial of service vulnerability (CAN-2003-0195)[12]
Phil D'Amore discovered that by sending a partial printing request to
the IPP port, remote attackers can cause a denial of service
condition, since the request does not time out. Simple commands such
as "lpq" stop working as long as the attacker holds the connection
with the partial printing request open.
Additionally, two other fixes which are not security related have
been included in Conectiva Linux 7.0 and 8:
1. Reconnect problem with some HP jetdirect printers;
2. Octetstream has been enabled by default, which allows some
printing jobs to be submitted such as those by Windows XP via samba.
SOLUTION
It is recommended that all cups users upgrade their packages.
IMPORTANT: after the upgrade, it is necessary to restart the cups
service if it was already running. To do so, execute the following
command as root:
/sbin/service cups restart
UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/cups-1.1.14-1U70_4cl.src.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/cups-1.1.14-1U70_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/cups-devel-1.1.14-1U70_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/cups-devel-static-1.1.14-1U70_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/cups-doc-1.1.14-1U70_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/7.0/RPMS/cups-libs-1.1.14-1U70_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/cups-1.1.14-2U80_4cl.src.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/cups-1.1.14-2U80_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/cups-devel-1.1.14-2U80_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/cups-devel-static-1.1.14-2U80_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/cups-doc-1.1.14-2U80_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/cups-libs-1.1.14-2U80_4cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/SRPMS/cups-1.1.18-29091U90_1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/cups-1.1.18-29091U90_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/cups-devel-1.1.18-29091U90_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/cups-devel-static-1.1.18-29091U90_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/cups-doc-1.1.18-29091U90_1cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/cups-libs-1.1.18-29091U90_1cl.i386.rpm
ADDITIONAL INSTRUCTIONS
The apt tool can be used to perform RPM packages upgrades:
- run: apt-get update
- after that, execute: apt-get upgrade
Detailed instructions reagarding the use of apt and upgrade examples
can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en
- -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
- -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en
- -------------------------------------------------------------------------
Copyright (c) 2003 Conectiva Inc.
http://www.conectiva.com
- -------------------------------------------------------------------------
subscribe: conectiva-updates-subscribe@...aleguas.conectiva.com.br
unsubscribe: conectiva-updates-unsubscribe@...aleguas.conectiva.com.br
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE/HYwc42jd0JmAcZARAtiUAKDplssuctl81JeOczaInYu9G8OVqwCgz2Um
50JG8ogfPb/GNqRa5Je7OJo=
=ar/E
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists