Short Name |
APP:CUPS:CUPS-JOBS-EXP |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
CUPS Jobs Form Exploit |
Release Date |
2003/04/22 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in the CUPS daemon. Version 1.1.17_pre20021025 is vulnerable. Attackers can send a maliciously crafted jobs form submission to the CUPS daemon to acquire command-line access with daemon permissions (typically lp).
A vulnerability has been reported for CUPS that may allow attackers to execute code with root privileges. Reportedly, some functions in the CUPS daemon use the strncat() function call improperly. When the CUPS daemon receives specially constructed printer attributes, it will trigger a buffer overflow condition when the strncat() function is used and may result in the corruption of sensitive memory with attacker-supplied values. It may be possible for an attacker to execute code with root privileges by exploiting this vulnerability. It should be noted that CUPS is not enabled by default in Red Hat Linux and Apple MacOS X.