First published: Wed Nov 07 2007(Updated: )
The Common UNIX Printing System (CUPS) provides a portable printing layer<br>for UNIX(R) operating systems.<br>Alin Rad Pop discovered several flaws in the handling of PDF files. An<br>attacker could create a malicious PDF file that would cause CUPS to crash<br>or potentially execute arbitrary code when printed.<br>(CVE-2007-4352, CVE-2007-5392, CVE-2007-5393)<br>Alin Rad Pop discovered a flaw in in the way CUPS handles certain IPP tags.<br>A remote attacker who is able to connect to the IPP TCP port could send a<br>malicious request causing the CUPS daemon to crash. (CVE-2007-4351)<br>A flaw was found in the way CUPS handled SSL negotiation. A remote attacker<br>capable of connecting to the CUPS daemon could cause CUPS to crash.<br>(CVE-2007-4045)<br>All CUPS users are advised to upgrade to these updated packages, which<br>contain backported patches to resolve these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cups | <1.1.22-0.rc1.9.20.2.el4_5.2 | 1.1.22-0.rc1.9.20.2.el4_5.2 |
redhat/cups | <1.1.22-0.rc1.9.20.2.el4_5.2 | 1.1.22-0.rc1.9.20.2.el4_5.2 |
redhat/cups-devel | <1.1.22-0.rc1.9.20.2.el4_5.2 | 1.1.22-0.rc1.9.20.2.el4_5.2 |
redhat/cups-libs | <1.1.22-0.rc1.9.20.2.el4_5.2 | 1.1.22-0.rc1.9.20.2.el4_5.2 |
redhat/cups-libs | <1.1.22-0.rc1.9.20.2.el4_5.2 | 1.1.22-0.rc1.9.20.2.el4_5.2 |
redhat/cups-devel | <1.1.22-0.rc1.9.20.2.el4_5.2 | 1.1.22-0.rc1.9.20.2.el4_5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2007:1022 is classified as critical due to potential crashes or execution of arbitrary code from malicious PDF files.
To fix RHSA-2007:1022, upgrade to the patched version 1.1.22-0.rc1.9.20.2.el4_5.2 of the CUPS package.
RHSA-2007:1022 affects various CUPS packages including cups, cups-devel, and cups-libs on Red Hat Enterprise Linux 4.
RHSA-2007:1022 addresses several flaws in PDF file handling that may lead to application crashes or remote code execution.
Unpatched systems may continue to operate, but they remain vulnerable to PDF file exploits that could compromise system integrity.