Rapid7 Vulnerability & Exploit Database

RHSA-2010:0811: cups security update

Back to Search

RHSA-2010:0811: cups security update

Severity
8
CVSS
(AV:A/AC:M/Au:N/C:C/I:C/A:C)
Published
11/05/2010
Created
07/25/2018
Added
11/11/2010
Modified
07/04/2017

Description

The Common UNIX Printing System (CUPS) provides a portable printing layerfor UNIX operating systems.A use-after-free flaw was found in the way the CUPS server parsed InternetPrinting Protocol (IPP) packets. A malicious user able to send IPP requeststo the CUPS server could use this flaw to crash the CUPS server or,potentially, execute arbitrary code with the privileges of the CUPS server.(CVE-2010-2941)A possible privilege escalation flaw was found in CUPS. An unprivilegedprocess running as the "lp" user (such as a compromised external filterprogram spawned by the CUPS server) could trick the CUPS server intooverwriting arbitrary files as the root user. (CVE-2010-2431)Red Hat would like to thank Emmanuel Bouillon of NATO C3 Agency forreporting the CVE-2010-2941 issue.Users of cups are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. After installing thisupdate, the cupsd daemon will be restarted automatically.

Solution(s)

  • redhat-upgrade-cups
  • redhat-upgrade-cups-devel
  • redhat-upgrade-cups-libs
  • redhat-upgrade-cups-lpd

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;