Scientific Linux Security Update : cups on SL5.x i386/x86_64

high Nessus Plugin ID 60881

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A use-after-free flaw was found in the way the CUPS server parsed Internet Printing Protocol (IPP) packets. A malicious user able to send IPP requests to the CUPS server could use this flaw to crash the CUPS server or, potentially, execute arbitrary code with the privileges of the CUPS server. (CVE-2010-2941)

A possible privilege escalation flaw was found in CUPS. An unprivileged process running as the 'lp' user (such as a compromised external filter program spawned by the CUPS server) could trick the CUPS server into overwriting arbitrary files as the root user.
(CVE-2010-2431)

After installing this update, the cupsd daemon will be restarted automatically.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?f6812e3b

Plugin Details

Severity: High

ID: 60881

File Name: sl_20101028_cups_on_SL5_x.nasl

Version: 1.6

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.9

Vector: CVSS2#AV:A/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 10/28/2010

Reference Information

CVE: CVE-2010-2431, CVE-2010-2941