Summary
Check the version of cups-filters
Solution
Please Install the Updated Packages.
Insight
The cups-filters package contains backends,
filters, and other softwarethat was once part of the core CUPS distribution but is now maintained independently.
An out-of-bounds read flaw was found in the way the process_browse_data() function of cups-browsed handled certain browse packets. A remote attacker could send a specially crafted browse packet that, when processed by cups-browsed, would crash the cups-browsed daemon. (CVE-2014-4337)
A flaw was found in the way the cups-browsed daemon interpreted the 'BrowseAllow' directive in the cups-browsed.conf file. An attacker able to add a malformed 'BrowseAllow' directive to the cups-browsed.conf file could use this flaw to bypass intended access restrictions. (CVE-2014-4338)
All cups-filters users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the cups-browsed daemon will be restarted automatically.
Affected
cups-filters on CentOS 7
Detection
Get the installed version with the help
of detect NVT and check if the version is vulnerable or not.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-4337, CVE-2014-4338 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:N/A:P
Related Vulnerabilities