Scientific Linux Security Update : cups-filters on SL7.x x86_64 (20151119)

high Nessus Plugin ID 87553

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A heap-based buffer overflow flaw and an integer overflow flaw leading to a heap-based buffer overflow were discovered in the way the texttopdf utility of cups-filter processed print jobs with a specially crafted line size. An attacker able to submit print jobs could use these flaws to crash texttopdf or, possibly, execute arbitrary code with the privileges of the 'lp' user. (CVE-2015-3258, CVE-2015-3279)

Notably, this update also fixes the following bug :

- Previously, when polling CUPS printers from a CUPS server, when a printer name contained an underscore (_), the client displayed the name containing a hyphen (-) instead. This made the print queue unavailable. With this update, CUPS allows the underscore character in printer names, and printers appear as shown on the CUPS server as expected.

In addition, this update adds the following enhancement :

- Now, the information from local and remote CUPS servers is cached during each poll, and the CUPS server load is reduced.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?dbff5690

Plugin Details

Severity: High

ID: 87553

File Name: sl_20151119_cups_filters_on_SL7_x.nasl

Version: 2.4

Type: local

Agent: unix

Published: 12/22/2015

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:cups-filters, p-cpe:/a:fermilab:scientific_linux:cups-filters-debuginfo, p-cpe:/a:fermilab:scientific_linux:cups-filters-devel, p-cpe:/a:fermilab:scientific_linux:cups-filters-libs, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 11/19/2015

Vulnerability Publication Date: 7/14/2015

Reference Information

CVE: CVE-2015-3258, CVE-2015-3279