CUPS Vulnerability Allows Attackers to Execute Code

Oct 31, 2007

Security researchers at Secunia have discovered a vulnerability in the Cups printing system.

A vulnerability detected in the standard printing system on Linux and Mac OS X, Cups, has been assigned the CVE number 2007-4351.

In the original advisory the Secunia experts write that the problem is caused by an error in the "ippReadIO()" function in the "cups/ipp.c" file. The vulnerability occurs when IPP tags (Internet Printing Protocol) are executed. Attackers could exploit the vulnerability by sending an IPP request with carefully crafted "textWithLanguage" or "nameWithLanguage" tags. This overwrites a byte on the stack with a zero. If the attack succeeds, the attacker may be able to execute arbitrary code on the target system.

The error was found in Cups 1.3.3 although other versions may be affected. As an update is not available at present, security experts recommend restricting the use of the printing system to trusted network environments.

Related content

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More