Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.63877
Category:Fedora Local Security Checks
Title:Fedora Core 10 FEDORA-2009-3769 (cups)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to cups
announced via advisory FEDORA-2009-3769.

This update fixes several security issues: CVE-2009-0163, CVE-2009-0164,
CVE-2009-0146, CVE-2009-0147, and CVE-2009-0166.

PDF files are now converted to PostScript using the poppler package's
pdftops program. NOTE: If your CUPS server is accessed using a
hostname or hostnames not known to the server itself you must add
ServerAlias hostname to cupsd.conf for each such name. The special
line ServerAlias * disables checking (but this allows DNS rebinding attacks).

ChangeLog:

* Tue Apr 21 2009 Tim Waugh 1:1.3.10-1
- 1.3.10. No longer need ext, includeifexists, str2988,
CVE-2008-5183, CVE-2008-5286, str3077, str3078, str3059, str3055 patches.
- Requires poppler-utils.
- NOTE: If your CUPS server is accessed using a hostname or hostnames
not known to the server itself you must add ServerAlias hostname
for each such name. The special line ServerAlias * disables checking
(but this allows DNS rebinding attacks).

References:

[ 1 ] Bug #490597 - CVE-2009-0164 cups: insufficient checking of the HTTP Host: header
https://bugzilla.redhat.com/show_bug.cgi?id=490597
[ 2 ] Bug #490596 - CVE-2009-0163 cups: Integer overflow in the TIFF image filter
https://bugzilla.redhat.com/show_bug.cgi?id=490596
[ 3 ] Bug #490612 - CVE-2009-0146 xpdf: Multiple buffer overflows in JBIG2 decoder (setBitmap, readSymbolDictSeg)
https://bugzilla.redhat.com/show_bug.cgi?id=490612
[ 4 ] Bug #490614 - CVE-2009-0147 xpdf: Multiple integer overflows in JBIG2 decoder
https://bugzilla.redhat.com/show_bug.cgi?id=490614
[ 5 ] Bug #490625 - CVE-2009-0166 xpdf: Freeing of potentially uninitialized memory in JBIG2 decoder
https://bugzilla.redhat.com/show_bug.cgi?id=490625

Solution: Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update cups' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

https://secure1.securityspace.com/smysecure/catid.html?in=FEDORA-2009-3769

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-0163
BugTraq ID: 34571
http://www.securityfocus.com/bid/34571
Bugtraq: 20090417 rPSA-2009-0061-1 cups (Google Search)
http://www.securityfocus.com/archive/1/502750/100/0/threaded
Debian Security Information: DSA-1773 (Google Search)
http://www.debian.org/security/2009/dsa-1773
http://security.gentoo.org/glsa/glsa-200904-20.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11546
http://www.redhat.com/support/errata/RHSA-2009-0428.html
http://www.redhat.com/support/errata/RHSA-2009-0429.html
http://www.securitytracker.com/id?1022070
http://secunia.com/advisories/34481
http://secunia.com/advisories/34722
http://secunia.com/advisories/34747
http://secunia.com/advisories/34756
http://secunia.com/advisories/34852
SuSE Security Announcement: SUSE-SA:2009:024 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html
http://www.ubuntu.com/usn/usn-760-1
Common Vulnerability Exposure (CVE) ID: CVE-2009-0164
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
BugTraq ID: 34665
http://www.securityfocus.com/bid/34665
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
http://secunia.com/advisories/35074
http://www.vupen.com/english/advisories/2009/1297
Common Vulnerability Exposure (CVE) ID: CVE-2009-0146
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
BugTraq ID: 34568
http://www.securityfocus.com/bid/34568
Bugtraq: 20090417 rPSA-2009-0059-1 poppler (Google Search)
http://www.securityfocus.com/archive/1/502761/100/0/threaded
Debian Security Information: DSA-1790 (Google Search)
http://www.debian.org/security/2009/dsa-1790
Debian Security Information: DSA-1793 (Google Search)
http://www.debian.org/security/2009/dsa-1793
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00567.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01277.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01291.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:101
http://www.mandriva.com/security/advisories?name=MDVSA-2010:087
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9632
http://www.redhat.com/support/errata/RHSA-2009-0430.html
http://www.redhat.com/support/errata/RHSA-2009-0431.html
RedHat Security Advisories: RHSA-2009:0458
http://rhn.redhat.com/errata/RHSA-2009-0458.html
http://www.redhat.com/support/errata/RHSA-2009-0480.html
http://www.securitytracker.com/id?1022073
http://secunia.com/advisories/34291
http://secunia.com/advisories/34755
http://secunia.com/advisories/34959
http://secunia.com/advisories/34963
http://secunia.com/advisories/34991
http://secunia.com/advisories/35037
http://secunia.com/advisories/35064
http://secunia.com/advisories/35065
http://secunia.com/advisories/35618
http://secunia.com/advisories/35685
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.578477
SuSE Security Announcement: SUSE-SR:2009:010 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
SuSE Security Announcement: SUSE-SR:2009:012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
http://www.vupen.com/english/advisories/2009/1065
http://www.vupen.com/english/advisories/2009/1066
http://www.vupen.com/english/advisories/2009/1077
http://www.vupen.com/english/advisories/2009/1621
http://www.vupen.com/english/advisories/2010/1040
Common Vulnerability Exposure (CVE) ID: CVE-2009-0147
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9941
Common Vulnerability Exposure (CVE) ID: CVE-2009-0166
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9778
Common Vulnerability Exposure (CVE) ID: CVE-2008-5183
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
BugTraq ID: 32419
http://www.securityfocus.com/bid/32419
Debian Security Information: DSA-2176 (Google Search)
http://www.debian.org/security/2011/dsa-2176
https://www.exploit-db.com/exploits/7150
http://www.mandriva.com/security/advisories?name=MDVSA-2009:028
http://lab.gnucitizen.org/projects/cups-0day
http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/
http://www.openwall.com/lists/oss-security/2008/11/19/3
http://www.openwall.com/lists/oss-security/2008/11/19/4
http://www.openwall.com/lists/oss-security/2008/11/20/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10586
http://www.redhat.com/support/errata/RHSA-2008-1029.html
http://www.securitytracker.com/id?1021396
http://secunia.com/advisories/33937
http://secunia.com/advisories/43521
SuSE Security Announcement: SUSE-SR:2008:026 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
http://www.vupen.com/english/advisories/2009/0422
http://www.vupen.com/english/advisories/2011/0535
XForce ISS Database: cups-rss-dos(46684)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46684
Common Vulnerability Exposure (CVE) ID: CVE-2008-5286
BugTraq ID: 32518
http://www.securityfocus.com/bid/32518
Debian Security Information: DSA-1677 (Google Search)
http://www.debian.org/security/2008/dsa-1677
http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml
http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:029
http://www.openwall.com/lists/oss-security/2008/12/01/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058
http://www.redhat.com/support/errata/RHSA-2008-1028.html
http://www.securitytracker.com/id?1021298
http://secunia.com/advisories/32962
http://secunia.com/advisories/33101
http://secunia.com/advisories/33111
http://secunia.com/advisories/33568
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
http://www.vupen.com/english/advisories/2008/3315
XForce ISS Database: cups-cupsimagereadpng-overflow(46933)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46933
Common Vulnerability Exposure (CVE) ID: CVE-2008-1722
BugTraq ID: 28781
http://www.securityfocus.com/bid/28781
CERT/CC vulnerability note: VU#218395
http://www.kb.cert.org/vuls/id/218395
Debian Security Information: DSA-1625 (Google Search)
http://www.debian.org/security/2008/dsa-1625
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00081.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00068.html
http://www.gentoo.org/security/en/glsa/glsa-200804-23.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:170
http://www.osvdb.org/44398
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8768
RedHat Security Advisories: RHSA-2008:0498
https://rhn.redhat.com/errata/RHSA-2008-0498.html
http://www.securitytracker.com/id?1019854
http://secunia.com/advisories/29809
http://secunia.com/advisories/29902
http://secunia.com/advisories/30078
http://secunia.com/advisories/30190
http://secunia.com/advisories/30553
http://secunia.com/advisories/30717
http://secunia.com/advisories/31324
http://secunia.com/advisories/32292
SuSE Security Announcement: SUSE-SR:2008:013 (Google Search)
http://www.novell.com/linux/security/advisories/2008_13_sr.html
http://www.ubuntu.com/usn/usn-606-1
https://usn.ubuntu.com/656-1/
http://www.vupen.com/english/advisories/2008/1226/references
XForce ISS Database: cups-imagepng-imagezoom-bo(41832)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41832
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.