Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

APP:CUPS:CGI-ADMIN-OF

Severity

Major

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

CUPS Administration Interface CGI Overflow

Release Date

2008/04/08

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: CUPS Administration Interface CGI Overflow


This signature detects attempts to exploit a known vulnerability in the CUPS Administration Interface CGI. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

CUPS is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial of service. CUPS 1.3.5 is reported vulnerable; other versions may be affected as well. NOTE: This issue was originally covered in BID 28304 (Apple Mac OS X 2008-002 Multiple Security Vulnerabilities), but has been given its own record because further information has emerged.

Affected Products

  • Apple mac_os_x 10.5.2
  • Apple mac_os_x_server 10.5.2
  • Debian linux 4.0
  • Debian linux 4.0 Alpha
  • Debian linux 4.0 Amd64
  • Debian linux 4.0 Arm
  • Debian linux 4.0 Hppa
  • Debian linux 4.0 Ia-32
  • Debian linux 4.0 Ia-64
  • Debian linux 4.0 M68k
  • Debian linux 4.0 Mips
  • Debian linux 4.0 Mipsel
  • Debian linux 4.0 Powerpc
  • Debian linux 4.0 S/390
  • Debian linux 4.0 Sparc
  • Easy_software_products cups 1.1.1
  • Easy_software_products cups 1.1.10
  • Easy_software_products cups 1.1.12
  • Easy_software_products cups 1.1.13
  • Easy_software_products cups 1.1.14
  • Easy_software_products cups 1.1.15
  • Easy_software_products cups 1.1.16
  • Easy_software_products cups 1.1.17
  • Easy_software_products cups 1.1.18
  • Easy_software_products cups 1.1.19
  • Easy_software_products cups 1.1.19 Rc5
  • Easy_software_products cups 1.1.20
  • Easy_software_products cups 1.1.21
  • Easy_software_products cups 1.1.22
  • Easy_software_products cups 1.1.22 Rc1
  • Easy_software_products cups 1.1.23
  • Easy_software_products cups 1.1.23 Rc1
  • Easy_software_products cups 1.1.4
  • Easy_software_products cups 1.1.4 -2
  • Easy_software_products cups 1.1.4 -3
  • Easy_software_products cups 1.1.4 -5
  • Easy_software_products cups 1.1.6
  • Easy_software_products cups 1.1.7
  • Easy_software_products cups 1.2.10
  • Easy_software_products cups 1.2.12
  • Easy_software_products cups 1.2.9
  • Easy_software_products cups 1.3.5
  • Gentoo net-print/cups 1.2.12-R6
  • Mandriva corporate_server 3.0.0
  • Mandriva corporate_server 3.0.0 X86 64
  • Mandriva corporate_server 4.0
  • Mandriva corporate_server 4.0.0 X86 64
  • Mandriva linux_mandrake 2007.0
  • Mandriva linux_mandrake 2007.0 X86 64
  • Mandriva linux_mandrake 2007.1
  • Mandriva linux_mandrake 2007.1 X86 64
  • Mandriva linux_mandrake 2008.0
  • Mandriva linux_mandrake 2008.0 X86 64
  • Red_hat desktop 3.0.0
  • Red_hat desktop 4.0.0
  • Red_hat enterprise_linux 5 Server
  • Red_hat enterprise_linux_as 3
  • Red_hat enterprise_linux_as 4
  • Red_hat enterprise_linux_desktop 5 Client
  • Red_hat enterprise_linux_desktop_workstation 5 Client
  • Red_hat enterprise_linux_es 3
  • Red_hat enterprise_linux_es 4
  • Red_hat enterprise_linux_ws 3
  • Red_hat enterprise_linux_ws 4
  • Red_hat fedora 7
  • Red_hat fedora 8
  • Slackware linux 12.0
  • Suse opensuse 10.2
  • Suse opensuse 10.3
  • Turbolinux appliance_server 1.0.0 Hosting Edition
  • Turbolinux appliance_server 1.0.0 Workgroup Edition
  • Turbolinux appliance_server 2.0
  • Turbolinux appliance_server 3.0
  • Turbolinux appliance_server 3.0 X64
  • Turbolinux appliance_server_hosting_edition 1.0.0
  • Turbolinux appliance_server_workgroup_edition 1.0.0
  • Turbolinux fuji
  • Turbolinux multimedia
  • Turbolinux personal
  • Turbolinux turbolinux_server 10.0.0
  • Turbolinux turbolinux_server 10.0.0 X64
  • Turbolinux turbolinux_server 11
  • Turbolinux turbolinux_server 11 X64
  • Ubuntu ubuntu_linux 6.06 LTS Amd64
  • Ubuntu ubuntu_linux 6.06 LTS I386
  • Ubuntu ubuntu_linux 6.06 LTS Powerpc
  • Ubuntu ubuntu_linux 6.06 LTS Sparc
  • Ubuntu ubuntu_linux 6.10 Amd64
  • Ubuntu ubuntu_linux 6.10 I386
  • Ubuntu ubuntu_linux 6.10 Powerpc
  • Ubuntu ubuntu_linux 6.10 Sparc
  • Ubuntu ubuntu_linux 7.04 Amd64
  • Ubuntu ubuntu_linux 7.04 I386
  • Ubuntu ubuntu_linux 7.04 Powerpc
  • Ubuntu ubuntu_linux 7.04 Sparc
  • Ubuntu ubuntu_linux 7.10 Amd64
  • Ubuntu ubuntu_linux 7.10 I386
  • Ubuntu ubuntu_linux 7.10 Powerpc
  • Ubuntu ubuntu_linux 7.10 Sparc

References

  • BugTraq: 28307
  • CVE: CVE-2008-0047
  • URL: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out