Rapid7 Vulnerability & Exploit Database

RHSA-2009:1082: cups security update

Back to Search

RHSA-2009:1082: cups security update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
06/09/2009
Created
07/25/2018
Added
09/12/2009
Modified
07/04/2017

Description

The Common UNIX® Printing System (CUPS) provides a portable printing layerfor UNIX operating systems. The Internet Printing Protocol (IPP) allowsusers to print and manage printing-related tasks over a network. A NULL pointer dereference flaw was found in the CUPS IPP routine, used forprocessing incoming IPP requests for the CUPS scheduler. An attacker coulduse this flaw to send specially-crafted IPP requests that would crash thecupsd daemon. (CVE-2009-0949)Red Hat would like to thank Anibal Sacco from Core Security Technologiesfor reporting this issue.Users of cups are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. After installing thisupdate, the cupsd daemon will be restarted automatically.

Solution(s)

  • redhat-upgrade-cups
  • redhat-upgrade-cups-devel
  • redhat-upgrade-cups-libs
  • redhat-upgrade-cups-lpd

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;