__________________________________________________________ The U.S. Department of Energy Computer Incident Advisory Capability ___ __ __ _ ___ / | /_\ / \___ __|__ / \ \___ __________________________________________________________ INFORMATION BULLETIN CUPS Security Update and Bug Fix Update [Red Hat RHSA-2007:1020-3] October 31, 2030 16:00 GMT Number S-032 [REVISED 26 Nov 2007] ______________________________________________________________________________ PROBLEM: A flaw was found in the way CUPS handles certain Internet Printing Protocol (IPP) tags. PLATFORM: RHEL Desktop Workstation (v. 5 client) Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux Desktop (v. 5 client) Debian GNU/Linux 4.0 (etch) DAMAGE: A remote attacker who is able to connect to the IPP TCP port could send a malicious request causing the CUPS daemon to crash, or potentially execute arbitrary code. SOLUTION: Upgrade to the appropriate version. ______________________________________________________________________________ VULNERABILITY The risk is LOW. A remote attacker who is able to connect to ASSESSMENT: the IPP TCP port could send a malicious request causing the CUPS daemon to crash, or potentially execute arbitrary code. ______________________________________________________________________________ LINKS: CIAC BULLETIN: http://www.ciac.org/ciac/bulletins/s-032.shtml ORIGINAL BULLETIN: https://rhn.redhat.com/errata/RHSA-2007-1020.html ADDITIONAL LINK: http://www.debian.org/security/2007/dsa-1407 CVE: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2007-4351 ______________________________________________________________________________ REVISION HISTORY: 11/26/2007 - revised S-032 to add a link to Debian Security Advisory DSA-1407-1 for Debian GNU/Linux 4.0 (etch). [***** Start Red Hat RHSA-2007:1020-3 *****] Important: cups security and bug fix update Advisory: RHSA-2007:1020-3 Type: Security Advisory Severity: Important Issued on: 2007-10-31 Last updated on: 2007-10-31 Affected Products: RHEL Desktop Workstation (v. 5 client) Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux Desktop (v. 5 client) OVAL: com.redhat.rhsa-20071020.xml CVEs (cve.mitre.org): CVE-2007-4351 Details Updated CUPS packages that fix a security issue in the Internet Printing Protocol (IPP) handling and correct some bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX(R) operating systems. A flaw was found in the way CUPS handles certain Internet Printing Protocol (IPP) tags. A remote attacker who is able to connect to the IPP TCP port could send a malicious request causing the CUPS daemon to crash, or potentially execute arbitrary code. Please note that the default CUPS configuration does not allow remote hosts to connect to the IPP TCP port. (CVE-2007-4351) Red Hat would like to thank Alin Rad Pop for reporting this issue. All CUPS users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. In addition, the following bugs were fixed: * the CUPS service has been changed to start after sshd, to avoid causing delays when logging in when the system is booted. * the logrotate settings have been adjusted so they do not cause CUPS to reload its configuration. This is to avoid re-printing the current job, which could occur when it was a long-running job. * a bug has been fixed in the handling of the If-Modified-Since: HTTP header. * in the LSPP configuration, labels for labeled jobs did not line-wrap. This has been fixed. * an access check in the LSPP configuration has been made more secure. * the cups-lpd service no longer ignores the "-odocument-format=..." option. * a memory allocation bug has been fixed in cupsd. * support for UNIX domain sockets authentication without passwords has been added. * in the LSPP configuration, a problem that could lead to cupsd crashing has been fixed. * the error handling in the initscript has been improved. * The job-originating-host-name attribute was not correctly set for jobs submitted via the cups-lpd service. This has been fixed. * a problem with parsing IPv6 addresses in the configuration file has been fixed. * a problem that could lead to cupsd crashing when it failed to open a "file:" URI has been fixed. Solution Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 Updated packages RHEL Desktop Workstation (v. 5 client) -------------------------------------------------------------------------------- IA-32: cups-devel-1.2.4-11.14.el5_1.1.i386.rpm b4fe280e49d3dcf3c63fd54524390a09 x86_64: cups-devel-1.2.4-11.14.el5_1.1.i386.rpm b4fe280e49d3dcf3c63fd54524390a09 cups-devel-1.2.4-11.14.el5_1.1.x86_64.rpm 263d1d22a7c9be2f4dbd0c8b43b80e2a Red Hat Enterprise Linux (v. 5 server) -------------------------------------------------------------------------------- SRPMS: cups-1.2.4-11.14.el5_1.1.src.rpm d4024b6f80540a02718c91f739a8bf05 IA-32: cups-1.2.4-11.14.el5_1.1.i386.rpm 04105308f4089ea32df6a2d8bf540d5a cups-devel-1.2.4-11.14.el5_1.1.i386.rpm b4fe280e49d3dcf3c63fd54524390a09 cups-libs-1.2.4-11.14.el5_1.1.i386.rpm b4e79e982cc21036b2848f6ded17ecdd cups-lpd-1.2.4-11.14.el5_1.1.i386.rpm 0ad495e3b1565dcdf0f75eac2eb5e8a7 IA-64: cups-1.2.4-11.14.el5_1.1.ia64.rpm af37a1ebfdf26598d5897bc9507e78f3 cups-devel-1.2.4-11.14.el5_1.1.ia64.rpm 7ac227b7833556eedb6ecba08ba6bca8 cups-libs-1.2.4-11.14.el5_1.1.i386.rpm b4e79e982cc21036b2848f6ded17ecdd cups-libs-1.2.4-11.14.el5_1.1.ia64.rpm 50caa7e5a1665b947b6d4ce812b4c082 cups-lpd-1.2.4-11.14.el5_1.1.ia64.rpm 887f0418bc37a56c2d1ac8d718b5f8b2 PPC: cups-1.2.4-11.14.el5_1.1.ppc.rpm 6aa115515899f2ee4c7cea725a0ccabb cups-devel-1.2.4-11.14.el5_1.1.ppc.rpm 3655447b3b729453387439aa0aee91af cups-devel-1.2.4-11.14.el5_1.1.ppc64.rpm bd9683c6898cdecf1064bdf9237a26f6 cups-libs-1.2.4-11.14.el5_1.1.ppc.rpm 55cf96a356456cc9c97260424a180e74 cups-libs-1.2.4-11.14.el5_1.1.ppc64.rpm 612f14d317b075c75b3ff6a879569a97 cups-lpd-1.2.4-11.14.el5_1.1.ppc.rpm 9ee96feb5dd1cb42503decbdc776d521 s390x: cups-1.2.4-11.14.el5_1.1.s390x.rpm cc0e592487e1443afe2632ce8132c200 cups-devel-1.2.4-11.14.el5_1.1.s390.rpm a4e18a2797c91483bffabefcb3bd257c cups-devel-1.2.4-11.14.el5_1.1.s390x.rpm 00fbb56f9d73eec63607ea20febfa616 cups-libs-1.2.4-11.14.el5_1.1.s390.rpm 754c8b7459b07318a7ee21e3947e0197 cups-libs-1.2.4-11.14.el5_1.1.s390x.rpm 52ee99fe60dec2c85ef0489642ab5b6e cups-lpd-1.2.4-11.14.el5_1.1.s390x.rpm 8779ba5c0746dad6c3899561b807b552 x86_64: cups-1.2.4-11.14.el5_1.1.x86_64.rpm 0a7fe3996a0c8ea2feb144fa07f76d98 cups-devel-1.2.4-11.14.el5_1.1.i386.rpm b4fe280e49d3dcf3c63fd54524390a09 cups-devel-1.2.4-11.14.el5_1.1.x86_64.rpm 263d1d22a7c9be2f4dbd0c8b43b80e2a cups-libs-1.2.4-11.14.el5_1.1.i386.rpm b4e79e982cc21036b2848f6ded17ecdd cups-libs-1.2.4-11.14.el5_1.1.x86_64.rpm 056a430c4c1308c44c88441639e312b9 cups-lpd-1.2.4-11.14.el5_1.1.x86_64.rpm c9d27661f6732bda4ae0b30e8f0aa725 Red Hat Enterprise Linux Desktop (v. 5 client) -------------------------------------------------------------------------------- SRPMS: cups-1.2.4-11.14.el5_1.1.src.rpm d4024b6f80540a02718c91f739a8bf05 IA-32: cups-1.2.4-11.14.el5_1.1.i386.rpm 04105308f4089ea32df6a2d8bf540d5a cups-libs-1.2.4-11.14.el5_1.1.i386.rpm b4e79e982cc21036b2848f6ded17ecdd cups-lpd-1.2.4-11.14.el5_1.1.i386.rpm 0ad495e3b1565dcdf0f75eac2eb5e8a7 x86_64: cups-1.2.4-11.14.el5_1.1.x86_64.rpm 0a7fe3996a0c8ea2feb144fa07f76d98 cups-libs-1.2.4-11.14.el5_1.1.i386.rpm b4e79e982cc21036b2848f6ded17ecdd cups-libs-1.2.4-11.14.el5_1.1.x86_64.rpm 056a430c4c1308c44c88441639e312b9 cups-lpd-1.2.4-11.14.el5_1.1.x86_64.rpm c9d27661f6732bda4ae0b30e8f0aa725 (The unlinked packages above are only available from the Red Hat Network) Bugs fixed (see bugzilla for more information) 213828 - Cups starts as S55cups, before sshd 228107 - [LSPP] Labels for labeled printing don't linewrap 229673 - [LSPP] cups is overriding mls when querying jobs with lpq -al 230073 - cups-lpd : server-args has no effect 230613 - [LSPP] cups is allowing users to delete other user's job 231522 - [LSPP] cupsd crash 237953 - Wrong init script 240223 - cups-lpd doesn't set 'job-originating-host-name' 241400 - IPV6 addresses not accepted in "Allow From" directives 250415 - cupsd crashes when failing to open a file: URI 345091 - CVE-2007-4351 cups boundary error References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351 http://www.redhat.com/security/updates/classification/#important -------------------------------------------------------------------------------- These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: https://www.redhat.com/security/team/key/#package The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/ [***** End Red Hat RHSA-2007:1020-3 *****] _______________________________________________________________________________ CIAC wishes to acknowledge the contributions of Red Hat for the information contained in this bulletin. _______________________________________________________________________________ CIAC, the Computer Incident Advisory Capability, is the computer security incident response team for the U.S. Department of Energy (DOE) and the emergency backup response team for the National Institutes of Health (NIH). CIAC is located at the Lawrence Livermore National Laboratory in Livermore, California. CIAC is also a founding member of FIRST, the Forum of Incident Response and Security Teams, a global organization established to foster cooperation and coordination among computer security teams worldwide. CIAC services are available to DOE, DOE contractors, and the NIH. CIAC can be contacted at: Voice: +1 925-422-8193 (7x24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@ciac.org Previous CIAC notices, anti-virus software, and other information are available from the CIAC Computer Security Archive. World Wide Web: http://www.ciac.org/ Anonymous FTP: ftp.ciac.org PLEASE NOTE: Many users outside of the DOE, ESnet, and NIH computing communities receive CIAC bulletins. If you are not part of these communities, please contact your agency's response team to report incidents. Your agency's team will coordinate with CIAC. The Forum of Incident Response and Security Teams (FIRST) is a world-wide organization. A list of FIRST member organizations and their constituencies can be obtained via WWW at http://www.first.org/. This document was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor the University of California nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation or favoring by the United States Government or the University of California. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or the University of California, and shall not be used for advertising or product endorsement purposes. LAST 10 CIAC BULLETINS ISSUED (Previous bulletins available from CIAC) S-022: Mozilla Products Vulnerabilities S-023: RealPlayer Playlist Vulnerability S-024: libpng Security Update S-025: reprepro Vulnerability S-026: xfce4-terminal Vulnerability S-027: t1lib Vulnerability S-028: Vulnerability in Java Runtime Environment Virtual Machine S-029: IBM Lotus Notes Vulnerabilities S-030: Adobe Security Update S-031: RSA Keon Vulnerability