First published: Mon May 04 2015(Updated: )
This flaw was fixed upstream back in 2010, without much attention being given to the possible security implications of it. It is a remote buffer overflow with possibility of executing arbitrary code, with only a few restrictions, such as having the cups service open to the network and a particular kind of filter in use. Analysis by Engineering shows that only RHEL-6 contains the affected code, so RHEL-5, RHEL-7 and Fedora are not affected. Giving this flaw a Moderate rating, despite the 7.7 CVSSv2 score, as cups is not usually configured widely open to the network or internet at large, and because it depends on a particular kind of filter being used. References: <a href="https://bugs.linuxfoundation.org/show_bug.cgi?id=515">https://bugs.linuxfoundation.org/show_bug.cgi?id=515</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1218297 is considered critical due to its potential for remote code execution.
To fix REDHAT-BUG-1218297, ensure that you apply the latest security updates provided by Red Hat.
The potential impacts of REDHAT-BUG-1218297 include remote code execution and possible compromise of the affected system.
REDHAT-BUG-1218297 affects multiple versions of Red Hat Enterprise Linux where the cups service is exposed to the network.
A temporary workaround for REDHAT-BUG-1218297 is to restrict access to the cups service until the vulnerability is patched.