Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.60711
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2008:0161
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2008:0161.

The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX(R) operating systems.

A flaw was found in the way CUPS handled the addition and removal of remote
shared printers via IPP. A remote attacker could send malicious UDP IPP
packets causing the CUPS daemon to attempt to dereference already freed
memory and crash. (CVE-2008-0597)

A memory management flaw was found in the way CUPS handled the addition and
removal of remote shared printers via IPP. When shared printer was
removed, allocated memory was not properly freed, leading to a memory leak
possibly causing CUPS daemon crash after exhausting available memory.
(CVE-2008-0596)

These issues were found during the investigation of CVE-2008-0882, which
did not affect Red Hat Enterprise Linux 4.

Note that the default configuration of CUPS on Red Hat Enterprise Linux
4 allow requests of this type only from the local subnet.

All CUPS users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2008-0161.html
http://www.redhat.com/security/updates/classification/#important

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-0596
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
BugTraq ID: 27988
http://www.securityfocus.com/bid/27988
Bugtraq: 20080229 rPSA-2008-0091-1 cups (Google Search)
http://www.securityfocus.com/archive/1/488966/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDVSA-2008:050
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10857
http://www.redhat.com/support/errata/RHSA-2008-0153.html
http://www.redhat.com/support/errata/RHSA-2008-0161.html
http://www.securitytracker.com/id?1019497
http://secunia.com/advisories/29087
http://secunia.com/advisories/29189
http://secunia.com/advisories/29251
http://secunia.com/advisories/29420
SuSE Security Announcement: SUSE-SA:2008:012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00000.html
http://www.vupen.com/english/advisories/2008/0924/references
XForce ISS Database: cups-ippbrowse-memoryleak-dos(40842)
https://exchange.xforce.ibmcloud.com/vulnerabilities/40842
Common Vulnerability Exposure (CVE) ID: CVE-2008-0597
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9492
XForce ISS Database: cups-ippbrowse-useafterfree-dos(40845)
https://exchange.xforce.ibmcloud.com/vulnerabilities/40845
Common Vulnerability Exposure (CVE) ID: CVE-2008-0882
BugTraq ID: 27906
http://www.securityfocus.com/bid/27906
Debian Security Information: DSA-1530 (Google Search)
http://www.debian.org/security/2008/dsa-1530
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00792.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00832.html
http://security.gentoo.org/glsa/glsa-200804-01.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:051
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9625
http://www.redhat.com/support/errata/RHSA-2008-0157.html
http://www.securitytracker.com/id?1019473
http://secunia.com/advisories/28994
http://secunia.com/advisories/29067
http://secunia.com/advisories/29120
http://secunia.com/advisories/29132
http://secunia.com/advisories/29485
http://secunia.com/advisories/29603
http://secunia.com/advisories/29634
http://www.ubuntu.com/usn/usn-598-1
http://www.vupen.com/english/advisories/2008/0623
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.