[Forgot Password]
Login  Register Subscribe

23631

 
 

126941

 
 

98503

 
 

909

 
 

79321

 
 

109

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2009:028 -- Mandriva cups

ID: oval:org.secpod.oval:def:300455Date: (C)2012-01-07   (M)2017-10-04
Class: PATCHFamily: unix




Security vulnerabilities have been discovered and corrected in CUPS. CUPS before 1.3.8 allows local users, and possibly remote attackers, to cause a denial of service by adding a large number of RSS Subscriptions, which triggers a NULL pointer dereference . The web interface in CUPS before 1.3.8 uses the guest username when a user is not logged on to the web server, which makes it easier for remote attackers to bypass intended policy and conduct CSRF attacks via the add and cancel RSS subscription functions . CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow . CUPS shipped with Mandriva Linux allows local users to overwrite arbitrary files via a symlink attack on the /tmp/pdf.log temporary file . The updated packages have been patched to prevent this.

Platform:
Mandriva Linux 2008.1
Mandriva Linux 2008.0
Product:
cups
Reference:
MDVSA-2009:028
CVE-2008-5183
CVE-2008-5184
CVE-2008-5286
CVE-2009-0032
CVE    4
CVE-2009-0032
CVE-2008-5286
CVE-2008-5184
CVE-2008-5183
...
CPE    2
cpe:/o:mandriva:linux:2008.1
cpe:/o:mandriva:linux:2008.0

© 2013 SecPod Technologies