First published: Wed Nov 07 2007(Updated: )
The Common UNIX Printing System (CUPS) provides a portable printing layer<br>for UNIX(R) operating systems.<br>Alin Rad Pop discovered a flaw in the handling of PDF files. An attacker<br>could create a malicious PDF file that would cause CUPS to crash or<br>potentially execute arbitrary code when printed. (CVE-2007-5393)<br>Alin Rad Pop discovered a flaw in in the way CUPS handles certain IPP tags.<br>A remote attacker who is able to connect to the IPP TCP port could send a<br>malicious request causing the CUPS daemon to crash. (CVE-2007-4351)<br>A flaw was found in the way CUPS handled SSL negotiation. A remote attacker<br>capable of connecting to the CUPS daemon could cause CUPS to crash.<br>(CVE-2007-4045)<br>All CUPS users are advised to upgrade to these updated packages, which<br>contain backported patches to resolve these issues.
Affected Software | Affected Version | How to fix |
---|---|---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2007:1023 is considered to be high due to the potential for denial of service and arbitrary code execution.
To fix RHSA-2007:1023, you should update the Common UNIX Printing System (CUPS) to the latest version provided by your distribution.
RHSA-2007:1023 affects systems running the Common UNIX Printing System (CUPS) with vulnerabilities in handling PDF files.
If an update is not immediately available, a potential workaround for RHSA-2007:1023 is to disable PDF printing in CUPS.
RHSA-2007:1023 can enable attackers to crash the CUPS service or execute arbitrary code through a specially crafted malicious PDF file.