openSUSE Security Update : cups-filters (openSUSE-2015-492)

high Nessus Plugin ID 84756

Synopsis

The remote openSUSE host is missing a security update.

Description

cups-filters was updated to fix three security issues.

These security issues were fixed :

- CVE-2015-2265: The remove_bad_chars function in utils/cups-browsed.c in cups-filters before 1.0.66 allowed remote IPP printers to execute arbitrary commands via consecutive shell metacharacters in the (1) model or (2) PDL. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707 (bsc#921753).

- CVE-2015-3279: Texttopdf integer overflow (incomplete fix for CVE-2015-3258) (bsc#937018).

- CVE-2015-3258: Texttopdf heap-based buffer overflow (bsc#936281).

Solution

Update the affected cups-filters packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=921753

https://bugzilla.opensuse.org/show_bug.cgi?id=936281

https://bugzilla.opensuse.org/show_bug.cgi?id=937018

Plugin Details

Severity: High

ID: 84756

File Name: openSUSE-2015-492.nasl

Version: 2.3

Type: local

Agent: unix

Published: 7/15/2015

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 8.3

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:cups-filters-foomatic-rip-debuginfo, p-cpe:/a:novell:opensuse:cups-filters-debugsource, cpe:/o:novell:opensuse:13.2, p-cpe:/a:novell:opensuse:cups-filters-debuginfo, p-cpe:/a:novell:opensuse:cups-filters-ghostscript-debuginfo, p-cpe:/a:novell:opensuse:cups-filters-ghostscript, p-cpe:/a:novell:opensuse:cups-filters-foomatic-rip, p-cpe:/a:novell:opensuse:cups-filters-devel, p-cpe:/a:novell:opensuse:cups-filters, p-cpe:/a:novell:opensuse:cups-filters-cups-browsed-debuginfo, p-cpe:/a:novell:opensuse:cups-filters-cups-browsed

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 7/7/2015

Reference Information

CVE: CVE-2014-2707, CVE-2015-2265, CVE-2015-3258, CVE-2015-3279