MDVSA-2009:028 -- Mandriva cups
|ID: oval:org.secpod.oval:def:300455||Date: (C)2012-01-07 (M)2018-06-01|
|Class: PATCH||Family: unix|
Security vulnerabilities have been discovered and corrected in CUPS. CUPS before 1.3.8 allows local users, and possibly remote attackers, to cause a denial of service by adding a large number of RSS Subscriptions, which triggers a NULL pointer dereference . The web interface in CUPS before 1.3.8 uses the guest username when a user is not logged on to the web server, which makes it easier for remote attackers to bypass intended policy and conduct CSRF attacks via the add and cancel RSS subscription functions . CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow . CUPS shipped with Mandriva Linux allows local users to overwrite arbitrary files via a symlink attack on the /tmp/pdf.log temporary file . The updated packages have been patched to prevent this.
|Mandriva Linux 2008.1|
|Mandriva Linux 2008.0|