Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.58714
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2007:1023
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2007:1023.

The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX(R) operating systems.

Alin Rad Pop discovered a flaw in the handling of PDF files. An attacker
could create a malicious PDF file that would cause CUPS to crash or
potentially execute arbitrary code when printed. (CVE-2007-5393)

Alin Rad Pop discovered a flaw in in the way CUPS handles certain IPP tags.
A remote attacker who is able to connect to the IPP TCP port could send a
malicious request causing the CUPS daemon to crash. (CVE-2007-4351)

A flaw was found in the way CUPS handled SSL negotiation. A remote attacker
capable of connecting to the CUPS daemon could cause CUPS to crash.
(CVE-2007-4045)

All CUPS users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2007-1023.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : Critical

CVSS Score:
10.0

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-4045
BugTraq ID: 26524
http://www.securityfocus.com/bid/26524
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00238.html
http://www.gentoo.org/security/en/glsa/glsa-200712-14.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:036
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9303
http://www.redhat.com/support/errata/RHSA-2007-1022.html
http://www.redhat.com/support/errata/RHSA-2007-1023.html
http://secunia.com/advisories/27577
http://secunia.com/advisories/27615
http://secunia.com/advisories/28113
SuSE Security Announcement: SUSE-SR:2007:014 (Google Search)
http://www.novell.com/linux/security/advisories/2007_14_sr.html
Common Vulnerability Exposure (CVE) ID: CVE-2007-4351
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
BugTraq ID: 26268
http://www.securityfocus.com/bid/26268
Cert/CC Advisory: TA07-352A
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
CERT/CC vulnerability note: VU#446897
http://www.kb.cert.org/vuls/id/446897
Cisco Security Advisory: 20080625 Wide Area Application Services (WAAS) Common UNIX Printing System (CUPS) Vulnerability
http://www.cisco.com/en/US/products/products_security_response09186a00809a1f11.html
Debian Security Information: DSA-1407 (Google Search)
http://www.debian.org/security/2007/dsa-1407
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00012.html
http://security.gentoo.org/glsa/glsa-200711-16.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:204
http://secunia.com/secunia_research/2007-76/advisory/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10604
http://www.redhat.com/support/errata/RHSA-2007-1020.html
http://www.securitytracker.com/id?1018879
http://secunia.com/advisories/27233
http://secunia.com/advisories/27410
http://secunia.com/advisories/27445
http://secunia.com/advisories/27447
http://secunia.com/advisories/27474
http://secunia.com/advisories/27494
http://secunia.com/advisories/27499
http://secunia.com/advisories/27540
http://secunia.com/advisories/27604
http://secunia.com/advisories/27712
http://secunia.com/advisories/28136
http://secunia.com/advisories/30847
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.501902
SuSE Security Announcement: SUSE-SA:2007:058 (Google Search)
http://www.novell.com/linux/security/advisories/2007_58_cups.html
https://usn.ubuntu.com/539-1/
http://www.vupen.com/english/advisories/2007/3681
http://www.vupen.com/english/advisories/2007/4238
http://www.vupen.com/english/advisories/2008/1934/references
XForce ISS Database: cups-ippreadio-bo(38190)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38190
Common Vulnerability Exposure (CVE) ID: CVE-2007-5393
BugTraq ID: 26367
http://www.securityfocus.com/bid/26367
Bugtraq: 20071107 Secunia Research: Xpdf "Stream.cc" Multiple Vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/483372
Debian Security Information: DSA-1408 (Google Search)
http://www.debian.org/security/2007/dsa-1408
Debian Security Information: DSA-1480 (Google Search)
http://www.debian.org/security/2008/dsa-1480
Debian Security Information: DSA-1509 (Google Search)
http://www.debian.org/security/2008/dsa-1509
Debian Security Information: DSA-1537 (Google Search)
http://www.debian.org/security/2008/dsa-1537
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00215.html
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00224.html
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00663.html
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00369.html
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00724.html
http://security.gentoo.org/glsa/glsa-200711-22.xml
http://security.gentoo.org/glsa/glsa-200711-34.xml
http://security.gentoo.org/glsa/glsa-200805-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:219
http://www.mandriva.com/security/advisories?name=MDKSA-2007:220
http://www.mandriva.com/security/advisories?name=MDKSA-2007:221
http://www.mandriva.com/security/advisories?name=MDKSA-2007:222
http://www.mandriva.com/security/advisories?name=MDKSA-2007:223
http://www.mandriva.com/security/advisories?name=MDKSA-2007:227
http://www.mandriva.com/security/advisories?name=MDKSA-2007:228
http://www.mandriva.com/security/advisories?name=MDKSA-2007:230
http://secunia.com/secunia_research/2007-88/advisory/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9839
http://www.redhat.com/support/errata/RHSA-2007-1021.html
http://www.redhat.com/support/errata/RHSA-2007-1024.html
http://www.redhat.com/support/errata/RHSA-2007-1025.html
http://www.redhat.com/support/errata/RHSA-2007-1026.html
http://www.redhat.com/support/errata/RHSA-2007-1027.html
http://www.redhat.com/support/errata/RHSA-2007-1028.html
http://www.redhat.com/support/errata/RHSA-2007-1029.html
http://www.redhat.com/support/errata/RHSA-2007-1030.html
http://www.redhat.com/support/errata/RHSA-2007-1031.html
http://www.redhat.com/support/errata/RHSA-2007-1051.html
http://www.securitytracker.com/id?1018905
http://secunia.com/advisories/26503
http://secunia.com/advisories/27260
http://secunia.com/advisories/27553
http://secunia.com/advisories/27573
http://secunia.com/advisories/27574
http://secunia.com/advisories/27575
http://secunia.com/advisories/27578
http://secunia.com/advisories/27579
http://secunia.com/advisories/27599
http://secunia.com/advisories/27618
http://secunia.com/advisories/27619
http://secunia.com/advisories/27632
http://secunia.com/advisories/27634
http://secunia.com/advisories/27636
http://secunia.com/advisories/27637
http://secunia.com/advisories/27640
http://secunia.com/advisories/27641
http://secunia.com/advisories/27642
http://secunia.com/advisories/27645
http://secunia.com/advisories/27656
http://secunia.com/advisories/27658
http://secunia.com/advisories/27705
http://secunia.com/advisories/27718
http://secunia.com/advisories/27721
http://secunia.com/advisories/27724
http://secunia.com/advisories/27743
http://secunia.com/advisories/27772
http://secunia.com/advisories/27856
http://secunia.com/advisories/28043
http://secunia.com/advisories/28812
http://secunia.com/advisories/29104
http://secunia.com/advisories/29604
http://secunia.com/advisories/30168
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.761882
SuSE Security Announcement: SUSE-SA:2007:060 (Google Search)
http://www.novell.com/linux/security/advisories/2007_60_pdf.html
http://www.ubuntu.com/usn/usn-542-1
http://www.ubuntu.com/usn/usn-542-2
http://www.vupen.com/english/advisories/2007/3774
http://www.vupen.com/english/advisories/2007/3775
http://www.vupen.com/english/advisories/2007/3776
http://www.vupen.com/english/advisories/2007/3779
http://www.vupen.com/english/advisories/2007/3786
XForce ISS Database: xpdf-ccittfaxstreamlookchar-bo(38304)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38304
Common Vulnerability Exposure (CVE) ID: CVE-2007-0720
http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
BugTraq ID: 22948
http://www.securityfocus.com/bid/22948
BugTraq ID: 23127
http://www.securityfocus.com/bid/23127
Bugtraq: 20070325 FLEA-2007-0003-1: cups (Google Search)
http://www.securityfocus.com/archive/1/463846/100/0/threaded
Cert/CC Advisory: TA07-072A
http://www.us-cert.gov/cas/techalerts/TA07-072A.html
http://fedoranews.org/cms/node/2785
http://security.gentoo.org/glsa/glsa-200703-28.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:086
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=232243
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11046
http://www.redhat.com/support/errata/RHSA-2007-0123.html
http://www.securitytracker.com/id?1017750
http://secunia.com/advisories/24479
http://secunia.com/advisories/24517
http://secunia.com/advisories/24530
http://secunia.com/advisories/24660
http://secunia.com/advisories/24878
http://secunia.com/advisories/24895
http://secunia.com/advisories/25119
http://secunia.com/advisories/25497
http://secunia.com/advisories/26083
http://secunia.com/advisories/26413
SuSE Security Announcement: SUSE-SR:2007:009 (Google Search)
http://www.novell.com/linux/security/advisories/2007_9_sr.html
http://www.vupen.com/english/advisories/2007/0930
http://www.vupen.com/english/advisories/2007/0949
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.