[PLDSA 12-1] New cups packages fix several vulnerabilities

Krzysiek Taraszka dzimi at pld.org.pl
Thu Jan 30 14:10:21 CET 2003


- --------------------------------------------------------------------------
PLD Security Advisory PLDSA 12-1                        security at pld.org.pl
http://www.pld.org.pl/security/                          PLD Security Team
11 January 2003 			http://www.pld.org.pl/security/faq
- --------------------------------------------------------------------------

Package        : prior to cups-1.1.14-21		
Vulnerability  : several
Problem-Type   : remote
PLD-specific   : no
CVE references : CAN-2002-1366, CAN-2002-1367, CAN-2002-1368, CAN-2002-1369, CAN-2002-1371,
CAN-2002-1372, CAN-2002-1383, CAN-2002-1384

Multiple vulnerabilities were discovered in the Common Unix Printing
System (CUPS).  Several of these issues represent the potential for a
remote compromise or denial of service.  The Common Vulnerabilities
and Exposures project identifies the following problems:

. CAN-2002-1366: Race conditions in connection with /etc/cups/certs/
  allow local users with lp privileges to create or overwrite
  arbitrary files.
   
. CAN-2002-1367: This vulnerabilities allows a remote attacker to add
  printers without authentication via a certain UDP packet, which can
  then be used to perform unauthorized activities such as stealing
  the local root certificate for the administration server via a
  "need authorization" page.

. CAN-2002-1368: Negative lengths fed into memcpy() can cause a
  denial of service and possibly execute arbitrary code.

. CAN-2002-1369: An unsafe strncat() function call processing the
  options string allows a remote attacker to execute arbitrary code
  via a buffer overflow.

. CAN-2002-1371: Zero width images allows a remote attacker to
  execute arbitrary code via modified chunk headers.

. CAN-2002-1372: CUPS does not properly check the return values of
  various file and socket operations, which could allow a remote
  attacker to cause a denial of service.

. CAN-2002-1383: Multiple integer overflows allow a remote attacker
  to execute arbitrary code via the CUPSd HTTP interface and the
  image handling code in CUPS filters.

. CAN-2002-1384: The cupsys package contains some code from the xpdf
  package, used to convert PDF files for printing, which contains an
  exploitable integer overflow bug.
  
The above problems have been fixed in version 1.1.14-22 for the
current stable distribution (ra).

We recommend that you upgrade your cups packages.

wget -c url
	will fetch the file for you
rpm -Uhv file(s)*.rpm
        will upgrade the referenced file.

If you are using "poldek" - the package manager, use the line as given below
for upgrade packages

poldek --update
        will update the internal database
poldek --upgrade 'cups*'
        will install corrected packages

If you are using "apt" - the package manager, use the line as given below
for upgrade packages

apt-get update
        will update the internal database
apt-get upgrade 'cups*'
        will install corrected packages

PLD Linux 1.0 alias ra
- --------------------

  Source archives:

ftp://ftp.pld.org.pl/dists/ra/updates/security/SRPMS/cups-1.1.14-22.src.rpm
       MD5 checksum: eaad706536733bb5016bafcf026de651

  I386 Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/cups-1.1.14-22.i386.rpm
       MD5 checksum: e0e906dfa0a054d5d953857f3fb83437

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/cups-clients-1.1.14-22.i386.rpm
       MD5 checksum: 1d6d70828db0548362d611839e14b08d

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/cups-devel-1.1.14-22.i386.rpm
       MD5 checksum: 883115ac579765f48cdcf02176867424

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/cups-image-lib-1.1.14-22.i386.rpm
       MD5 checksum: 56388fa68e3c6868f293aac69f0c3472

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/cups-lib-1.1.14-22.i386.rpm
       MD5 checksum: c64efe08b059390290a92337af06f30a

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/cups-static-1.1.14-22.i386.rpm
       MD5 checksum: d969097a4c23ecac5e2f0e465db41184


  I586 Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/cups-1.1.14-22.i586.rpm
       MD5 checksum: d1efaf1328e27a867af9b2c528ed8eec

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/cups-clients-1.1.14-22.i586.rpm
       MD5 checksum: 9e7471bfdd4306db402e667d33f36cd9

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/cups-devel-1.1.14-22.i586.rpm
       MD5 checksum: 0722464d3ab6da79888fcccefe9ca64d

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/cups-image-lib-1.1.14-22.i586.rpm
       MD5 checksum: a695fb82367df3384b70576bd1f782e3

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/cups-lib-1.1.14-22.i586.rpm
       MD5 checksum: b2b84c5a773f7ad454cce82dd7d90147

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/cups-static-1.1.14-22.i586.rpm
       MD5 checksum: 17fcbe0367f966b104918129e2fee1db


  I686 Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/cups-1.1.14-22.i686.rpm
       MD5 checksum: a80675bf0c3ebe2c70182abbd558423f

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/cups-clients-1.1.14-22.i686.rpm
       MD5 checksum: 768b830b3b8e1d4e8d916f223ee66943

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/cups-devel-1.1.14-22.i686.rpm
       MD5 checksum: 868ce98d028ca2481634ea593c9f1401

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/cups-image-lib-1.1.14-22.i686.rpm
       MD5 checksum: 67528a07af150b9a2f946b555a246540

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/cups-lib-1.1.14-22.i686.rpm
       MD5 checksum: c17b4adef73a8344cba4b204a0d0fed3

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/cups-static-1.1.14-22.i686.rpm
       MD5 checksum: 65fd8ab1e014cf139d7df587715bcf09


  PowerPC Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/cups-1.1.14-22.ppc.rpm
       MD5 checksum: 50234d4867bf02fa6140cde160858f8a

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/cups-clients-1.1.14-22.ppc.rpm
       MD5 checksum: 47593a0c1a7891989dc2cf635cbc9a1e

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/cups-devel-1.1.14-22.ppc.rpm
       MD5 checksum: 40ce0d745505b3a3f1994f002bd5c4c0

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/cups-image-lib-1.1.14-22.ppc.rpm
       MD5 checksum: 42d9e4a6cbb985c28397f29940e8ca28

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/cups-lib-1.1.14-22.ppc.rpm
       MD5 checksum: bd389690f29f7c3fa3b065c1a00fec91

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/cups-static-1.1.14-22.ppc.rpm
       MD5 checksum: fc67e944260d6ec81d855ecd87b15bbd


-
--------------------------------------------------------------------------------
-
If you are using poldek add this line to poldek.conf.
If you are using apt-get add this line to sources.list.

For i386 architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/i386 base updates-security
For i586 architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/i586 base updates-security
For i686 architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/i686 base updates-security
For ppc architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/ppc base updates-security



More information about the pld-security-announce mailing list