Rapid7 Vulnerability & Exploit Database

RHSA-2009:1595: cups security update

Back to Search

RHSA-2009:1595: cups security update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
11/19/2009
Created
07/25/2018
Added
11/23/2009
Modified
07/04/2017

Description

The Common UNIX Printing System (CUPS) provides a portable printing layerfor UNIX operating systems.A use-after-free flaw was found in the way CUPS handled references in itsfile descriptors-handling interface. A remote attacker could, in aspecially-crafted way, query for the list of current print jobs for aspecific printer, leading to a denial of service (cupsd crash).(CVE-2009-3553)Several cross-site scripting (XSS) flaws were found in the way the CUPS webserver interface processed HTML form content. If a remote attacker couldtrick a local user who is logged into the CUPS web interface into visitinga specially-crafted HTML page, the attacker could retrieve and potentiallymodify confidential CUPS administration data. (CVE-2009-2820)Red Hat would like to thank Aaron Sigel of Apple Product Security forresponsibly reporting the CVE-2009-2820 issue.Users of cups are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. After installing theupdate, the cupsd daemon will be restarted automatically.

Solution(s)

  • redhat-upgrade-cups
  • redhat-upgrade-cups-devel
  • redhat-upgrade-cups-libs
  • redhat-upgrade-cups-lpd

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;