Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:CUPS:CGI-ADMIN-OF

Severity

High

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

CUPS Administration Interface CGI Overflow

Release Date

2008/04/08

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: CUPS Administration Interface CGI Overflow


This signature detects attempts to exploit a known vulnerability in the CUPS Administration Interface CGI. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

CUPS is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial of service. CUPS 1.3.5 is reported vulnerable; other versions may be affected as well. NOTE: This issue was originally covered in BID 28304 (Apple Mac OS X 2008-002 Multiple Security Vulnerabilities), but has been given its own record because further information has emerged.

Affected Products

  • Apple Mac OS X 10.5.2
  • Apple Mac OS X Server 10.5.2
  • Debian Linux 4.0
  • Debian Linux 4.0 Alpha
  • Debian Linux 4.0 Amd64
  • Debian Linux 4.0 Arm
  • Debian Linux 4.0 Hppa
  • Debian Linux 4.0 Ia-32
  • Debian Linux 4.0 Ia-64
  • Debian Linux 4.0 M68k
  • Debian Linux 4.0 Mips
  • Debian Linux 4.0 Mipsel
  • Debian Linux 4.0 Powerpc
  • Debian Linux 4.0 S/390
  • Debian Linux 4.0 Sparc
  • Easy Software Products CUPS 1.1.1
  • Easy Software Products CUPS 1.1.10
  • Easy Software Products CUPS 1.1.12
  • Easy Software Products CUPS 1.1.13
  • Easy Software Products CUPS 1.1.14
  • Easy Software Products CUPS 1.1.15
  • Easy Software Products CUPS 1.1.16
  • Easy Software Products CUPS 1.1.17
  • Easy Software Products CUPS 1.1.18
  • Easy Software Products CUPS 1.1.19
  • Easy Software Products CUPS 1.1.19 Rc5
  • Easy Software Products CUPS 1.1.20
  • Easy Software Products CUPS 1.1.21
  • Easy Software Products CUPS 1.1.22
  • Easy Software Products CUPS 1.1.22 Rc1
  • Easy Software Products CUPS 1.1.23
  • Easy Software Products CUPS 1.1.23 Rc1
  • Easy Software Products CUPS 1.1.4
  • Easy Software Products CUPS 1.1.4 -2
  • Easy Software Products CUPS 1.1.4 -3
  • Easy Software Products CUPS 1.1.4 -5
  • Easy Software Products CUPS 1.1.6
  • Easy Software Products CUPS 1.1.7
  • Easy Software Products CUPS 1.2.10
  • Easy Software Products CUPS 1.2.12
  • Easy Software Products CUPS 1.2.9
  • Easy Software Products CUPS 1.3.5
  • Gentoo net-print/cups 1.2.12-R6
  • Mandriva Corporate Server 3.0.0
  • Mandriva Corporate Server 3.0.0 X86 64
  • Mandriva Corporate Server 4.0
  • Mandriva Corporate Server 4.0.0 X86 64
  • Mandriva Linux Mandrake 2007.0
  • Mandriva Linux Mandrake 2007.0 X86 64
  • Mandriva Linux Mandrake 2007.1
  • Mandriva Linux Mandrake 2007.1 X86 64
  • Mandriva Linux Mandrake 2008.0
  • Mandriva Linux Mandrake 2008.0 X86 64
  • Red Hat Desktop 3.0.0
  • Red Hat Desktop 4.0.0
  • Red Hat Enterprise Linux 5 Server
  • Red Hat Enterprise Linux AS 3
  • Red Hat Enterprise Linux AS 4
  • Red Hat Enterprise Linux Desktop 5 Client
  • Red Hat Enterprise Linux Desktop Workstation 5 Client
  • Red Hat Enterprise Linux ES 3
  • Red Hat Enterprise Linux ES 4
  • Red Hat Enterprise Linux WS 3
  • Red Hat Enterprise Linux WS 4
  • Red Hat Fedora 7
  • Red Hat Fedora 8
  • Slackware Linux 12.0
  • SuSE openSUSE 10.2
  • SuSE openSUSE 10.3
  • Turbolinux Appliance Server 1.0.0 Hosting Edition
  • Turbolinux Appliance Server 1.0.0 Workgroup Edition
  • Turbolinux Appliance Server 2.0
  • Turbolinux Appliance Server 3.0
  • Turbolinux Appliance Server 3.0 X64
  • Turbolinux Appliance Server Hosting Edition 1.0.0
  • Turbolinux Appliance Server Workgroup Edition 1.0.0
  • Turbolinux FUJI
  • Turbolinux Multimedia
  • Turbolinux Personal
  • Turbolinux Turbolinux Server 10.0.0
  • Turbolinux Turbolinux Server 10.0.0 X64
  • Turbolinux Turbolinux Server 11
  • Turbolinux Turbolinux Server 11 X64
  • Ubuntu Ubuntu Linux 6.06 LTS Amd64
  • Ubuntu Ubuntu Linux 6.06 LTS I386
  • Ubuntu Ubuntu Linux 6.06 LTS Powerpc
  • Ubuntu Ubuntu Linux 6.06 LTS Sparc
  • Ubuntu Ubuntu Linux 6.10 Amd64
  • Ubuntu Ubuntu Linux 6.10 I386
  • Ubuntu Ubuntu Linux 6.10 Powerpc
  • Ubuntu Ubuntu Linux 6.10 Sparc
  • Ubuntu Ubuntu Linux 7.04 Amd64
  • Ubuntu Ubuntu Linux 7.04 I386
  • Ubuntu Ubuntu Linux 7.04 Powerpc
  • Ubuntu Ubuntu Linux 7.04 Sparc
  • Ubuntu Ubuntu Linux 7.10 Amd64
  • Ubuntu Ubuntu Linux 7.10 I386
  • Ubuntu Ubuntu Linux 7.10 Powerpc
  • Ubuntu Ubuntu Linux 7.10 Sparc

References

  • BugTraq: 28307
  • CVE: CVE-2008-0047
  • URL: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out