[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SA:2009:024 -- SUSE cups remote code execution

ID: oval:org.secpod.oval:def:400072Date: (C)2012-01-31   (M)2024-01-02
Class: PATCHFamily: unix




The Common Unix Printing System, CUPS, is a printing server for unix-like operating systems. It allows a local user to print documents as well as remote users via port 631/tcp. There were two security vulnerabilities fixed in cups. The first one can be triggered by a specially crafted tiff file. This file could lead to an integer overflow in the "imagetops" filter which caused an heap overflow later. This bug is probably exploitable remotely by users having remote access to the CUPS server and allows the execution of arbitrary code with the privileges of the cupsd process. CVE-2009-0163 The second issue affects the JBIG2 decoding of the "pdftops" filter. The JBIG2 decoding routines are vulnerable to various software failure types like integer and buffer overflows and it is believed to be exploit- able remotely to execute arbitrary code with the privileges of the cupsd process. CVE-2009-0799, CVE-2009-1182, CVE-2009-1183

Platform:
openSUSE 10.3
openSUSE 11.1
openSUSE 11.0
Product:
cups
Reference:
SUSE-SA:2009:024
CVE-2009-0146
CVE-2009-0147
CVE-2009-0163
CVE-2009-0165
CVE-2009-0166
CVE-2009-0799
CVE-2009-0800
CVE-2009-1179
CVE-2009-1180
CVE-2009-1181
CVE-2009-1182
CVE-2009-1183
CVE    12
CVE-2009-0800
CVE-2009-0799
CVE-2009-0165
CVE-2009-0163
...
CPE    3
cpe:/o:opensuse:opensuse:11.1
cpe:/o:opensuse:opensuse:11.0
cpe:/o:opensuse:opensuse:10.3

© SecPod Technologies