First published: Thu May 14 2015(Updated: )
The following flaw was found in CUPS: Cupsd uses reference-counted strings with global scope. When parsing a print job request, cupsd over-decrements the reference count for a string from the request. As a result, an attacker can prematurely free an arbitrary string of global scope. They can use this to dismantle ACLs protecting privileged operations, and upload a replacement configuration file, and subsequently run arbitrary code on a target machine. This bug is exploitable in default configurations, and does not require any special permissions other than the basic ability to print. Acknowledgements: Red Hat would like to thank the CERT/CC for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1221641 is classified as high due to its potential to lead to arbitrary code execution.
To fix REDHAT-BUG-1221641, you should update your CUPS installation to the latest version that addresses this vulnerability.
REDHAT-BUG-1221641 affects specific versions of CUPS that include the flawed implementation of reference-counted strings.
Yes, REDHAT-BUG-1221641 can be exploited remotely if an attacker can send a crafted print job request.
The impact of REDHAT-BUG-1221641 on system security includes the possibility of an attacker executing arbitrary code on the affected system.