Description: | Description:
The remote host is missing an update to cups announced via advisory MDKSA-2005:008.
A buffer overflow was discovered in the ParseCommand function in the hpgltops utility. An attacker with the ability to send malicious HPGL files to a printer could possibly execute arbitrary code as the lp user (CVE-2004-1267).
Vulnerabilities in the lppasswd utility were also discovered. The program ignores write errors when modifying the CUPS passwd file. A local user who is able to fill the associated file system could corrupt the CUPS passwd file or prevent future use of lppasswd (CVE-2004-1268 and CVE-2004-1269). As well, lppasswd does not verify that the passwd.new file is different from STDERR, which could allow a local user to control output to passwd.new via certain user input that could trigger an error message (CVE-2004-1270).
The updated packages have been patched to prevent these problems.
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1, Corporate Server 3.0
Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2005:008 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1267 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1268 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1269 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1270
Risk factor : High
CVSS Score: 6.5
|