First published: Tue Mar 17 2009(Updated: )
An integer overflow flaw, leading to a heap-based buffer overflow, was discovered in the Tagged Image File Format (TIFF) decoding routines used by the CUPS image-converting filters, "imagetops" and "imagetoraster". An attacker could create a malicious TIFF file that could, potentially, execute arbitrary code as the "lp" user if the file was printed. Acknowledgements: Red Hat would like to thank Aaron Sigel of the Apple Product Security team and iDefense for responsibly reporting this flaw.
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-490596 is classified as high due to the potential for remote code execution.
REDHAT-BUG-490596 affects CUPS by allowing an attacker to exploit a heap-based buffer overflow through specially crafted TIFF files.
To fix REDHAT-BUG-490596, you should update CUPS to the latest version that addresses this vulnerability.
Exploiting REDHAT-BUG-490596 can lead to arbitrary code execution on the affected system.
Currently, there are no specific workarounds for REDHAT-BUG-490596 other than applying the recommended updates.