blob: 4f6db6bb3cf3288cdc1017dbd7173af43c496a58 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200812-11">
<title>CUPS: Multiple vulnerabilities</title>
Several remotely exploitable bugs have been found in CUPS, which allow
remote execution of arbitrary code.
<product type="ebuild">cups</product>
<announced>December 10, 2008</announced>
<revised>December 10, 2008: 01</revised>
<package name="net-print/cups" auto="yes" arch="*">
<unaffected range="ge">1.3.9-r1</unaffected>
<vulnerable range="lt">1.3.9-r1</vulnerable>
CUPS is the Common Unix Printing System.
Several buffer overflows were found in:
The read_rle16 function in imagetops (CVE-2008-3639, found by
regenrecht, reported via ZDI)
The WriteProlog function in texttops (CVE-2008-3640, found by
regenrecht, reported via ZDI)
The Hewlett-Packard Graphics Language (HPGL) filter (CVE-2008-3641,
found by regenrecht, reported via iDefense)
The _cupsImageReadPNG function (CVE-2008-5286, reported by iljavs)
<impact type="high">
A remote attacker could send specially crafted input to a vulnerable
server, resulting in the remote execution of arbitrary code with the
privileges of the user running the server.
None this time.
All CUPS users should upgrade to the latest version.
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-print/cups-1.3.9-r1&quot;</code>
<uri link="">CVE-2008-3639</uri>
<uri link="">CVE-2008-3640</uri>
<uri link="">CVE-2008-3641</uri>
<uri link="">CVE-2008-5286</uri>
<metadata tag="submitter" timestamp="Sat, 29 Nov 2008 10:13:17 +0000">
<metadata tag="bugReady" timestamp="Sat, 06 Dec 2008 18:09:49 +0000">