First published: Fri Apr 04 2014(Updated: )
It was reported that ANSI escape sequences could be added to printer names in CUPS. Becaue CUPS has a browsing feature that, when enabled, allows remote hosts to announce shared printers, a malicious host or user could send a specially-crafted UDP packet to a CUPS server announcing an arbitrary printer name that includes ANSI escape sequences. Since the CUPS daemon does not remove these characters, a user on the targeted system could query the printer list (using 'lpstat -a', for example). If this were done in a terminal that supported the ANSI escape sequences (like a terminal with support for color), then code execution could be possible as the terminal would interpret the ANSI escape sequences contained in the printer name.
Affected Software | Affected Version | How to fix |
---|---|---|
Apple CUPS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1084577 is considered to be critical, as it allows for remote execution of arbitrary commands through crafted printer names.
To fix REDHAT-BUG-1084577, update your CUPS installation to the latest version that has addressed this vulnerability.
REDHAT-BUG-1084577 affects the Apple CUPS software running on various platforms that utilize it for printing services.
Exploiting REDHAT-BUG-1084577 could allow an attacker to execute arbitrary commands on the CUPS server, leading to unauthorized access and system compromise.
REDHAT-BUG-1084577 was reported in early June 2014.