LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: September 26th, 2014
Linux Security Week: September 22nd, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
RedHat: Important: cups security and bug fix update Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
RedHat Linux A flaw was found in the way CUPS handles certain Internet Printing Protocol (IPP) tags. A remote attacker who is able to connect to the IPP TCP port could send a malicious request causing the CUPS daemon to crash, or potentially execute arbitrary code. Please note that the default CUPS configuration does not allow remote hosts to connect to the IPP TCP port. This update has been rated as having important security impact by the Red Hat Security Response Team.
- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: cups security and bug fix update
Advisory ID:       RHSA-2007:1020-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-1020.html
Issue date:        2007-10-31
Updated on:        2007-10-31
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2007-4351 
- ---------------------------------------------------------------------

1. Summary:

Updated CUPS packages that fix a security issue in the Internet Printing
Protocol (IPP) handling and correct some bugs are now available for Red Hat
Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX(R) operating systems.

A flaw was found in the way CUPS handles certain Internet Printing Protocol
(IPP) tags. A remote attacker who is able to connect to the IPP TCP port
could send a malicious request causing the CUPS daemon to crash, or
potentially execute arbitrary code. Please note that the default CUPS
configuration does not allow remote hosts to connect to the IPP TCP port.
(CVE-2007-4351)

Red Hat would like to thank Alin Rad Pop for reporting this issue.

All CUPS users are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue.

In addition, the following bugs were fixed:

* the CUPS service has been changed to start after sshd, to avoid causing
delays when logging in when the system is booted.

* the logrotate settings have been adjusted so they do not cause CUPS to
reload its configuration. This is to avoid re-printing the current job,
which could occur when it was a long-running job.

* a bug has been fixed in the handling of the If-Modified-Since: HTTP
header.

* in the LSPP configuration, labels for labeled jobs did not line-wrap.
This has been fixed.

* an access check in the LSPP configuration has been made more secure.

* the cups-lpd service no longer ignores the "-odocument-format=..."
option.

* a memory allocation bug has been fixed in cupsd.

* support for UNIX domain sockets authentication without passwords has been
added.

* in the LSPP configuration, a problem that could lead to cupsd crashing
has been fixed.

* the error handling in the initscript has been improved.

* The job-originating-host-name attribute was not correctly set for jobs
submitted via the cups-lpd service. This has been fixed.

* a problem with parsing IPv6 addresses in the configuration file has been
fixed.

* a problem that could lead to cupsd crashing when it failed to open a
"file:" URI has been fixed.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

213828 - Cups starts as S55cups, before sshd
228107 - [LSPP] Labels for labeled printing don't linewrap
229673 - [LSPP] cups is overriding mls when querying jobs with lpq -al
230073 - cups-lpd : server-args has no effect
230613 - [LSPP] cups is allowing users to delete other user's job
231522 - [LSPP] cupsd crash
237953 - Wrong init script
240223 - cups-lpd doesn't set 'job-originating-host-name'
241400 - IPV6 addresses not accepted in  "Allow From" directives
250415 - cupsd crashes when failing to open a file: URI
345091 - CVE-2007-4351 cups boundary error

6. RPMs required:

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cups-1.2.4-11.14.el5_1.1.src.rpm
d4024b6f80540a02718c91f739a8bf05  cups-1.2.4-11.14.el5_1.1.src.rpm

i386:
04105308f4089ea32df6a2d8bf540d5a  cups-1.2.4-11.14.el5_1.1.i386.rpm
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
b4e79e982cc21036b2848f6ded17ecdd  cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
0ad495e3b1565dcdf0f75eac2eb5e8a7  cups-lpd-1.2.4-11.14.el5_1.1.i386.rpm

x86_64:
0a7fe3996a0c8ea2feb144fa07f76d98  cups-1.2.4-11.14.el5_1.1.x86_64.rpm
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
a3f2712e792df40303b4c861864673c7  cups-debuginfo-1.2.4-11.14.el5_1.1.x86_64.rpm
b4e79e982cc21036b2848f6ded17ecdd  cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
056a430c4c1308c44c88441639e312b9  cups-libs-1.2.4-11.14.el5_1.1.x86_64.rpm
c9d27661f6732bda4ae0b30e8f0aa725  cups-lpd-1.2.4-11.14.el5_1.1.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cups-1.2.4-11.14.el5_1.1.src.rpm
d4024b6f80540a02718c91f739a8bf05  cups-1.2.4-11.14.el5_1.1.src.rpm

i386:
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
b4fe280e49d3dcf3c63fd54524390a09  cups-devel-1.2.4-11.14.el5_1.1.i386.rpm

x86_64:
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
a3f2712e792df40303b4c861864673c7  cups-debuginfo-1.2.4-11.14.el5_1.1.x86_64.rpm
b4fe280e49d3dcf3c63fd54524390a09  cups-devel-1.2.4-11.14.el5_1.1.i386.rpm
263d1d22a7c9be2f4dbd0c8b43b80e2a  cups-devel-1.2.4-11.14.el5_1.1.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/cups-1.2.4-11.14.el5_1.1.src.rpm
d4024b6f80540a02718c91f739a8bf05  cups-1.2.4-11.14.el5_1.1.src.rpm

i386:
04105308f4089ea32df6a2d8bf540d5a  cups-1.2.4-11.14.el5_1.1.i386.rpm
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
b4fe280e49d3dcf3c63fd54524390a09  cups-devel-1.2.4-11.14.el5_1.1.i386.rpm
b4e79e982cc21036b2848f6ded17ecdd  cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
0ad495e3b1565dcdf0f75eac2eb5e8a7  cups-lpd-1.2.4-11.14.el5_1.1.i386.rpm

ia64:
af37a1ebfdf26598d5897bc9507e78f3  cups-1.2.4-11.14.el5_1.1.ia64.rpm
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
75e856f97b8a1ae6d183ed3d4fdd8d68  cups-debuginfo-1.2.4-11.14.el5_1.1.ia64.rpm
7ac227b7833556eedb6ecba08ba6bca8  cups-devel-1.2.4-11.14.el5_1.1.ia64.rpm
b4e79e982cc21036b2848f6ded17ecdd  cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
50caa7e5a1665b947b6d4ce812b4c082  cups-libs-1.2.4-11.14.el5_1.1.ia64.rpm
887f0418bc37a56c2d1ac8d718b5f8b2  cups-lpd-1.2.4-11.14.el5_1.1.ia64.rpm

ppc:
6aa115515899f2ee4c7cea725a0ccabb  cups-1.2.4-11.14.el5_1.1.ppc.rpm
fbb63189e62c3639add434d7a9522b25  cups-debuginfo-1.2.4-11.14.el5_1.1.ppc.rpm
0109adc637556efb2ebfc60f345e685f  cups-debuginfo-1.2.4-11.14.el5_1.1.ppc64.rpm
3655447b3b729453387439aa0aee91af  cups-devel-1.2.4-11.14.el5_1.1.ppc.rpm
bd9683c6898cdecf1064bdf9237a26f6  cups-devel-1.2.4-11.14.el5_1.1.ppc64.rpm
55cf96a356456cc9c97260424a180e74  cups-libs-1.2.4-11.14.el5_1.1.ppc.rpm
612f14d317b075c75b3ff6a879569a97  cups-libs-1.2.4-11.14.el5_1.1.ppc64.rpm
9ee96feb5dd1cb42503decbdc776d521  cups-lpd-1.2.4-11.14.el5_1.1.ppc.rpm

s390x:
cc0e592487e1443afe2632ce8132c200  cups-1.2.4-11.14.el5_1.1.s390x.rpm
cb49bab7c8c4d595dbefff730582311d  cups-debuginfo-1.2.4-11.14.el5_1.1.s390.rpm
d6cd0e3e4eb460f33900ff066142c008  cups-debuginfo-1.2.4-11.14.el5_1.1.s390x.rpm
a4e18a2797c91483bffabefcb3bd257c  cups-devel-1.2.4-11.14.el5_1.1.s390.rpm
00fbb56f9d73eec63607ea20febfa616  cups-devel-1.2.4-11.14.el5_1.1.s390x.rpm
754c8b7459b07318a7ee21e3947e0197  cups-libs-1.2.4-11.14.el5_1.1.s390.rpm
52ee99fe60dec2c85ef0489642ab5b6e  cups-libs-1.2.4-11.14.el5_1.1.s390x.rpm
8779ba5c0746dad6c3899561b807b552  cups-lpd-1.2.4-11.14.el5_1.1.s390x.rpm

x86_64:
0a7fe3996a0c8ea2feb144fa07f76d98  cups-1.2.4-11.14.el5_1.1.x86_64.rpm
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
a3f2712e792df40303b4c861864673c7  cups-debuginfo-1.2.4-11.14.el5_1.1.x86_64.rpm
b4fe280e49d3dcf3c63fd54524390a09  cups-devel-1.2.4-11.14.el5_1.1.i386.rpm
263d1d22a7c9be2f4dbd0c8b43b80e2a  cups-devel-1.2.4-11.14.el5_1.1.x86_64.rpm
b4e79e982cc21036b2848f6ded17ecdd  cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
056a430c4c1308c44c88441639e312b9  cups-libs-1.2.4-11.14.el5_1.1.x86_64.rpm
c9d27661f6732bda4ae0b30e8f0aa725  cups-lpd-1.2.4-11.14.el5_1.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Honeypot Snares Two Bots Exploiting Bash Vulnerability
CloudFlare Rolls Out Free SSL
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.