Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.60069
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-1437-1)
Summary:The remote host is missing an update for the Debian 'cupsys' package(s) announced via the DSA-1437-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'cupsys' package(s) announced via the DSA-1437-1 advisory.

Vulnerability Insight:
Several local vulnerabilities have been discovered in the Common UNIX Printing System. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2007-5849

Wei Wang discovered that an buffer overflow in the SNMP backend may lead to the execution of arbitrary code.

CVE-2007-6358

Elias Pipping discovered that insecure handling of a temporary file in the pdftops.pl script may lead to local denial of service. This vulnerability is not exploitable in the default configuration.

The old stable distribution (sarge) is not affected by CVE-2007-5849. The other issue doesn't warrant an update on it's own and has been postponed.

For the stable distribution (etch), these problems have been fixed in version 1.2.7-4etch2.

For the unstable distribution (sid), these problems have been fixed in version 1.3.5-1.

We recommend that you upgrade your cupsys packages.

Affected Software/OS:
'cupsys' package(s) on Debian 4.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-5849
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
BugTraq ID: 26910
http://www.securityfocus.com/bid/26910
BugTraq ID: 26917
http://www.securityfocus.com/bid/26917
Cert/CC Advisory: TA07-352A
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
Debian Security Information: DSA-1437 (Google Search)
http://www.debian.org/security/2007/dsa-1437
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00908.html
http://www.gentoo.org/security/en/glsa/glsa-200712-14.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:036
http://secunia.com/advisories/28113
http://secunia.com/advisories/28129
http://secunia.com/advisories/28136
http://secunia.com/advisories/28200
http://secunia.com/advisories/28386
http://secunia.com/advisories/28441
http://secunia.com/advisories/28636
http://secunia.com/advisories/28676
SuSE Security Announcement: SUSE-SA:2008:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00003.html
SuSE Security Announcement: SUSE-SR:2008:002 (Google Search)
http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
http://www.ubuntu.com/usn/usn-563-1
http://www.vupen.com/english/advisories/2007/4238
http://www.vupen.com/english/advisories/2007/4242
XForce ISS Database: cups-asn1getstring-bo(39101)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39101
XForce ISS Database: macos-snmp-bo(39097)
https://exchange.xforce.ibmcloud.com/vulnerabilities/39097
Common Vulnerability Exposure (CVE) ID: CVE-2007-6358
BugTraq ID: 26919
http://www.securityfocus.com/bid/26919
http://osvdb.org/42029
http://secunia.com/advisories/28139
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.