[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2009:028 -- Mandriva cups

ID: oval:org.secpod.oval:def:300455Date: (C)2012-01-07   (M)2024-01-02
Class: PATCHFamily: unix




Security vulnerabilities have been discovered and corrected in CUPS. CUPS before 1.3.8 allows local users, and possibly remote attackers, to cause a denial of service by adding a large number of RSS Subscriptions, which triggers a NULL pointer dereference . The web interface in CUPS before 1.3.8 uses the guest username when a user is not logged on to the web server, which makes it easier for remote attackers to bypass intended policy and conduct CSRF attacks via the add and cancel RSS subscription functions . CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow . CUPS shipped with Mandriva Linux allows local users to overwrite arbitrary files via a symlink attack on the /tmp/pdf.log temporary file . The updated packages have been patched to prevent this.

Platform:
Mandriva Linux 2008.1
Mandriva Linux 2008.0
Product:
cups
Reference:
MDVSA-2009:028
CVE-2008-5183
CVE-2008-5184
CVE-2008-5286
CVE-2009-0032
CVE    4
CVE-2008-5184
CVE-2009-0032
CVE-2008-5286
CVE-2008-5183
...
CPE    2
cpe:/o:mandriva:linux:2008.1
cpe:/o:mandriva:linux:2008.0

© SecPod Technologies