Rapid7 Vulnerability & Exploit Database

RHSA-2010:0490: cups security update

Back to Search

RHSA-2010:0490: cups security update



The Common UNIX Printing System (CUPS) provides a portable printing layerfor UNIX operating systems. The CUPS "texttops" filter converts text filesto PostScript.A missing memory allocation failure check flaw, leading to a NULL pointerdereference, was found in the CUPS "texttops" filter. An attacker couldcreate a malicious text file that would cause "texttops" to crash or,potentially, execute arbitrary code as the "lp" user if the file wasprinted. (CVE-2010-0542)A Cross-Site Request Forgery (CSRF) issue was found in the CUPS webinterface. If a remote attacker could trick a user, who is logged into theCUPS web interface as an administrator, into visiting a specially-craftedwebsite, the attacker could reconfigure and disable CUPS, and gain accessto print jobs and system files. (CVE-2010-0540)Note: As a result of the fix for CVE-2010-0540, cookies must now be enabledin your web browser to use the CUPS web interface.An uninitialized memory read issue was found in the CUPS web interface. Ifan attacker had access to the CUPS web interface, they could use aspecially-crafted URL to leverage this flaw to read a limited amount ofmemory from the cupsd process, possibly obtaining sensitive information.(CVE-2010-1748)Red Hat would like to thank the Apple Product Security team for responsiblyreporting these issues. Upstream acknowledges regenrecht as the originalreporter of CVE-2010-0542; Adrian 'pagvac' Pastor of GNUCITIZEN and TimStarling as the original reporters of CVE-2010-0540; and Luca Carettoni asthe original reporter of CVE-2010-1748.Users of cups are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. After installing thisupdate, the cupsd daemon will be restarted automatically.


  • redhat-upgrade-cups
  • redhat-upgrade-cups-devel
  • redhat-upgrade-cups-libs
  • redhat-upgrade-cups-lpd

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center