Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.880585
Category:CentOS Local Security Checks
Title:CentOS Update for cups CESA-2010:0490 centos5 i386
Summary:The remote host is missing an update for the 'cups'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'cups'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX operating systems. The CUPS 'texttops' filter converts text files
to PostScript.

A missing memory allocation failure check flaw, leading to a NULL pointer
dereference, was found in the CUPS 'texttops' filter. An attacker could
create a malicious text file that would cause 'texttops' to crash or,
potentially, execute arbitrary code as the 'lp' user if the file was
printed. (CVE-2010-0542)

A Cross-Site Request Forgery (CSRF) issue was found in the CUPS web
interface. If a remote attacker could trick a user, who is logged into the
CUPS web interface as an administrator, into visiting a specially-crafted
website, the attacker could reconfigure and disable CUPS, and gain access
to print jobs and system files. (CVE-2010-0540)

Note: As a result of the fix for CVE-2010-0540, cookies must now be enabled
in your web browser to use the CUPS web interface.

An uninitialized memory read issue was found in the CUPS web interface. If
an attacker had access to the CUPS web interface, they could use a
specially-crafted URL to leverage this flaw to read a limited amount of
memory from the cupsd process, possibly obtaining sensitive information.
(CVE-2010-1748)

Red Hat would like to thank the Apple Product Security team for responsibly
reporting these issues. Upstream acknowledges regenrecht as the original
reporter of CVE-2010-0542 Adrian 'pagvac' Pastor of GNUCITIZEN and Tim
Starling as the original reporters of CVE-2010-0540, and Luca Carettoni as
the original reporter of CVE-2010-1748.

Users of cups are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing this
update, the cupsd daemon will be restarted automatically.

Affected Software/OS:
cups on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-0540
http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html
BugTraq ID: 40871
http://www.securityfocus.com/bid/40871
Debian Security Information: DSA-2176 (Google Search)
http://www.debian.org/security/2011/dsa-2176
http://security.gentoo.org/glsa/glsa-201207-10.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
http://www.mandriva.com/security/advisories?name=MDVSA-2010:233
http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10382
http://www.securitytracker.com/id?1024122
http://secunia.com/advisories/40220
http://secunia.com/advisories/43521
http://www.vupen.com/english/advisories/2010/1481
http://www.vupen.com/english/advisories/2011/0535
Common Vulnerability Exposure (CVE) ID: CVE-2010-0542
BugTraq ID: 40943
http://www.securityfocus.com/bid/40943
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10365
http://securitytracker.com/id?1024121
SuSE Security Announcement: SUSE-SR:2010:023 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-1748
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9723
CopyrightCopyright (C) 2011 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.