First published: Thu Apr 16 2009(Updated: )
The Common UNIX® Printing System (CUPS) provides a portable printing layer<br>for UNIX operating systems.<br>Multiple integer overflow flaws were found in the CUPS JBIG2 decoder. An<br>attacker could create a malicious PDF file that would cause CUPS to crash<br>or, potentially, execute arbitrary code as the "lp" user if the file was<br>printed. (CVE-2009-0147, CVE-2009-1179)<br>Multiple buffer overflow flaws were found in the CUPS JBIG2 decoder. An<br>attacker could create a malicious PDF file that would cause CUPS to crash<br>or, potentially, execute arbitrary code as the "lp" user if the file was<br>printed. (CVE-2009-0146, CVE-2009-1182)<br>Multiple flaws were found in the CUPS JBIG2 decoder that could lead to the<br>freeing of arbitrary memory. An attacker could create a malicious PDF file<br>that would cause CUPS to crash or, potentially, execute arbitrary code<br>as the "lp" user if the file was printed. (CVE-2009-0166, CVE-2009-1180)<br>Multiple input validation flaws were found in the CUPS JBIG2 decoder. An<br>attacker could create a malicious PDF file that would cause CUPS to crash<br>or, potentially, execute arbitrary code as the "lp" user if the file was<br>printed. (CVE-2009-0800)<br>An integer overflow flaw, leading to a heap-based buffer overflow, was<br>discovered in the Tagged Image File Format (TIFF) decoding routines used by<br>the CUPS image-converting filters, "imagetops" and "imagetoraster". An<br>attacker could create a malicious TIFF file that could, potentially,<br>execute arbitrary code as the "lp" user if the file was printed.<br>(CVE-2009-0163)<br>Multiple denial of service flaws were found in the CUPS JBIG2 decoder. An<br>attacker could create a malicious PDF file that would cause CUPS to crash<br>when printed. (CVE-2009-0799, CVE-2009-1181, CVE-2009-1183)<br>Red Hat would like to thank Aaron Sigel, Braden Thomas and Drew Yao of<br>the Apple Product Security team, and Will Dormann of the CERT/CC for<br>responsibly reporting these flaws.<br>Users of cups are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues. After installing the<br>update, the cupsd daemon will be restarted automatically.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cups | <1.3.7-8.el5_3.4 | 1.3.7-8.el5_3.4 |
redhat/cups | <1.3.7-8.el5_3.4 | 1.3.7-8.el5_3.4 |
redhat/cups-devel | <1.3.7-8.el5_3.4 | 1.3.7-8.el5_3.4 |
redhat/cups-devel | <1.3.7-8.el5_3.4 | 1.3.7-8.el5_3.4 |
redhat/cups-libs | <1.3.7-8.el5_3.4 | 1.3.7-8.el5_3.4 |
redhat/cups-libs | <1.3.7-8.el5_3.4 | 1.3.7-8.el5_3.4 |
redhat/cups-lpd | <1.3.7-8.el5_3.4 | 1.3.7-8.el5_3.4 |
redhat/cups-lpd | <1.3.7-8.el5_3.4 | 1.3.7-8.el5_3.4 |
redhat/cups | <1.1.22-0.rc1.9.27.el4_7.5 | 1.1.22-0.rc1.9.27.el4_7.5 |
redhat/cups | <1.1.22-0.rc1.9.27.el4_7.5 | 1.1.22-0.rc1.9.27.el4_7.5 |
redhat/cups-devel | <1.1.22-0.rc1.9.27.el4_7.5 | 1.1.22-0.rc1.9.27.el4_7.5 |
redhat/cups-libs | <1.1.22-0.rc1.9.27.el4_7.5 | 1.1.22-0.rc1.9.27.el4_7.5 |
redhat/cups-libs | <1.1.22-0.rc1.9.27.el4_7.5 | 1.1.22-0.rc1.9.27.el4_7.5 |
redhat/cups-devel | <1.1.22-0.rc1.9.27.el4_7.5 | 1.1.22-0.rc1.9.27.el4_7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.