Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2003:001: cups Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the cups package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2003:001 (cups).

iDefense reported several security problems in CUPS that can lead to local and
remote root compromise. An integer overflow in the HTTP interface can be used to
gain remote access with CUPS privilege. A local file race condition can be used
to gain root privilege, although the previous bug must be exploited first. An
attacker can remotely add printers to the vulnerable system. A remote DoS can be
accomplished due to negative length in the memcpy() call. An integer overflow in
image handling code can be used to gain higher privilege. A possible hacker can gain
local root privilege due to a buffer overflow of the 'options' buffer. A design
problem can be exploited to gain local root access, however this needs an added
printer (which can also be done, as per a previously noted bug). Wrong handling
of zero-width images can be abused to gain higher privilege. Finally, a file
descriptor leak and DoS due to missing checks of return values of file/socket
MandrakeSoft recommends all users upgrade these CUPS packages immediately.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.