First published: Wed Nov 18 2009(Updated: )
The Common UNIX Printing System (CUPS) provides a portable printing layer<br>for UNIX operating systems.<br>A use-after-free flaw was found in the way CUPS handled references in its<br>file descriptors-handling interface. A remote attacker could, in a<br>specially-crafted way, query for the list of current print jobs for a<br>specific printer, leading to a denial of service (cupsd crash).<br>(CVE-2009-3553)<br>Several cross-site scripting (XSS) flaws were found in the way the CUPS web<br>server interface processed HTML form content. If a remote attacker could<br>trick a local user who is logged into the CUPS web interface into visiting<br>a specially-crafted HTML page, the attacker could retrieve and potentially<br>modify confidential CUPS administration data. (CVE-2009-2820)<br>Red Hat would like to thank Aaron Sigel of Apple Product Security for<br>responsibly reporting the CVE-2009-2820 issue.<br>Users of cups are advised to upgrade to these updated packages, which<br>contain backported patches to correct these issues. After installing the<br>update, the cupsd daemon will be restarted automatically.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cups | <1.3.7-11.el5_4.4 | 1.3.7-11.el5_4.4 |
redhat/cups | <1.3.7-11.el5_4.4 | 1.3.7-11.el5_4.4 |
redhat/cups-devel | <1.3.7-11.el5_4.4 | 1.3.7-11.el5_4.4 |
redhat/cups-devel | <1.3.7-11.el5_4.4 | 1.3.7-11.el5_4.4 |
redhat/cups-libs | <1.3.7-11.el5_4.4 | 1.3.7-11.el5_4.4 |
redhat/cups-libs | <1.3.7-11.el5_4.4 | 1.3.7-11.el5_4.4 |
redhat/cups-lpd | <1.3.7-11.el5_4.4 | 1.3.7-11.el5_4.4 |
redhat/cups-lpd | <1.3.7-11.el5_4.4 | 1.3.7-11.el5_4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.