Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.64165
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-707-1)
Summary:The remote host is missing an update for the 'cups, cupsys' package(s) announced via the USN-707-1 advisory.
Description:Summary:
The remote host is missing an update for the 'cups, cupsys' package(s) announced via the USN-707-1 advisory.

Vulnerability Insight:
It was discovered that CUPS didn't properly handle adding a large number of RSS
subscriptions. A local user could exploit this and cause CUPS to crash, leading
to a denial of service. This issue only applied to Ubuntu 7.10, 8.04 LTS and
8.10. (CVE-2008-5183)

It was discovered that CUPS did not authenticate users when adding and
cancelling RSS subscriptions. An unprivileged local user could bypass intended
restrictions and add a large number of RSS subscriptions. This issue only
applied to Ubuntu 7.10 and 8.04 LTS. (CVE-2008-5184)

It was discovered that the PNG filter in CUPS did not properly handle certain
malformed images. If a user or automated system were tricked into opening a
crafted PNG image file, a remote attacker could cause a denial of service or
execute arbitrary code with user privileges. In Ubuntu 7.10, 8.04 LTS, and 8.10,
attackers would be isolated by the AppArmor CUPS profile. (CVE-2008-5286)

It was discovered that the example pstopdf CUPS filter created log files in an
insecure way. Local users could exploit a race condition to create or overwrite
files with the privileges of the user invoking the program. This issue only
applied to Ubuntu 6.06 LTS, 7.10, and 8.04 LTS. (CVE-2008-5377)

Affected Software/OS:
'cups, cupsys' package(s) on Ubuntu 6.06, Ubuntu 7.10, Ubuntu 8.04, Ubuntu 8.10.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-5183
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
BugTraq ID: 32419
http://www.securityfocus.com/bid/32419
Debian Security Information: DSA-2176 (Google Search)
http://www.debian.org/security/2011/dsa-2176
https://www.exploit-db.com/exploits/7150
http://www.mandriva.com/security/advisories?name=MDVSA-2009:028
http://lab.gnucitizen.org/projects/cups-0day
http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/
http://www.openwall.com/lists/oss-security/2008/11/19/3
http://www.openwall.com/lists/oss-security/2008/11/19/4
http://www.openwall.com/lists/oss-security/2008/11/20/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10586
http://www.redhat.com/support/errata/RHSA-2008-1029.html
http://www.securitytracker.com/id?1021396
http://secunia.com/advisories/33937
http://secunia.com/advisories/43521
SuSE Security Announcement: SUSE-SR:2008:026 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
http://www.vupen.com/english/advisories/2009/0422
http://www.vupen.com/english/advisories/2011/0535
XForce ISS Database: cups-rss-dos(46684)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46684
Common Vulnerability Exposure (CVE) ID: CVE-2008-5184
Common Vulnerability Exposure (CVE) ID: CVE-2008-5286
BugTraq ID: 32518
http://www.securityfocus.com/bid/32518
Debian Security Information: DSA-1677 (Google Search)
http://www.debian.org/security/2008/dsa-1677
http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml
http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:029
http://www.openwall.com/lists/oss-security/2008/12/01/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058
http://www.redhat.com/support/errata/RHSA-2008-1028.html
http://www.securitytracker.com/id?1021298
http://secunia.com/advisories/32962
http://secunia.com/advisories/33101
http://secunia.com/advisories/33111
http://secunia.com/advisories/33568
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
http://www.vupen.com/english/advisories/2008/3315
XForce ISS Database: cups-cupsimagereadpng-overflow(46933)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46933
Common Vulnerability Exposure (CVE) ID: CVE-2008-5377
https://www.exploit-db.com/exploits/7550
http://uvw.ru/report.sid.txt
http://lists.debian.org/debian-devel/2008/08/msg00347.html
CopyrightCopyright (C) 2009 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.