-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2010:234 http://www.mandriva.com/security/ _______________________________________________________________________ Package : cups Date : November 15, 2010 Affected: Corporate 4.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities were discovered and corrected in cups: Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS, allows remote attackers to hijack the authentication of administrators for requests that change settings (CVE-2010-0540). The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file (CVE-2010-0542). The web interface in CUPS, reads uninitialized memory during handling of form variables, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via unspecified vectors (CVE-2010-1748). The cupsFileOpen function in CUPS before 1.4.4 allows local users, with lp group membership, to overwrite arbitrary files via a symlink attack on the (1) /var/cache/cups/remote.cache or (2) /var/cache/cups/job.cache file (CVE-2010-2431). ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request (CVE-2010-2941). The updated packages have been upgraded to cups 1.3.10 and patched to correct these issues. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0540 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2431 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941 _______________________________________________________________________ Updated Packages: Corporate 4.0: a70707b734172e4cc62536bbe3d61e8a corporate/4.0/i586/cups-1.3.10-0.2.20060mlcs4.i586.rpm 83275ec158cb120e87bd9990f687c3e3 corporate/4.0/i586/cups-common-1.3.10-0.2.20060mlcs4.i586.rpm e9e7a8eeaee319edaecf4d2283b4c997 corporate/4.0/i586/cups-serial-1.3.10-0.2.20060mlcs4.i586.rpm 2964cb8c01bd9845843af93c3f1d0dcc corporate/4.0/i586/libcups2-1.3.10-0.2.20060mlcs4.i586.rpm f0ea2682acee384564855eaa87c0655e corporate/4.0/i586/libcups2-devel-1.3.10-0.2.20060mlcs4.i586.rpm bd729b2a5a534aee24d3baa2ee687b90 corporate/4.0/i586/php-cups-1.3.10-0.2.20060mlcs4.i586.rpm 2c4d2f34b37a24868fb1741653874e91 corporate/4.0/SRPMS/cups-1.3.10-0.2.20060mlcs4.src.rpm Corporate 4.0/X86_64: 2b95d5b8308cce2a370976dfa5a6ffb8 corporate/4.0/x86_64/cups-1.3.10-0.2.20060mlcs4.x86_64.rpm f2c7c412e00f7f3c87ce61c474501fe5 corporate/4.0/x86_64/cups-common-1.3.10-0.2.20060mlcs4.x86_64.rpm ee9e581c5edf7b644f82558982d4a4b4 corporate/4.0/x86_64/cups-serial-1.3.10-0.2.20060mlcs4.x86_64.rpm f5d433ad9810166a535c66fd7044df48 corporate/4.0/x86_64/lib64cups2-1.3.10-0.2.20060mlcs4.x86_64.rpm 522bae9acebd832bce1fbf6283f53842 corporate/4.0/x86_64/lib64cups2-devel-1.3.10-0.2.20060mlcs4.x86_64.rpm c42c8974ac32db059476a4fdf4a418b8 corporate/4.0/x86_64/php-cups-1.3.10-0.2.20060mlcs4.x86_64.rpm 2c4d2f34b37a24868fb1741653874e91 corporate/4.0/SRPMS/cups-1.3.10-0.2.20060mlcs4.src.rpm _______________________________________________________________________ To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandriva Linux at: http://www.mandriva.com/security/advisories If you want to report vulnerabilities, please contact security_(at)_mandriva.com _______________________________________________________________________ Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iD8DBQFM4aJimqjQ0CJFipgRAlxxAJ0YrVreqh38DP1i/2f+tplble9mcACfWNfs A+OYt2VgjsAaduNhopCYsfM= =C+zl -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/