Summary
Check the version of cups-filters
Solution
Please Install the Updated Packages.
Insight
The cups-filters package contains backends, filters, and other software that was once part of the core CUPS distribution but is now maintained independently.
An out-of-bounds read flaw was found in the way the process_browse_data() function of cups-browsed handled certain browse packets. A remote attacker could send a specially crafted browse packet that, when processed by cups-browsed, would crash the cups-browsed daemon. (CVE-2014-4337)
A flaw was found in the way the cups-browsed daemon interpreted the 'BrowseAllow' directive in the cups-browsed.conf file. An attacker able to add a malformed 'BrowseAllow' directive to the cups-browsed.conf file could use this flaw to bypass intended access restrictions. (CVE-2014-4338)
All cups-filters users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the cups-browsed daemon will be restarted automatically.
Affected
cups-filters on Red Hat Enterprise Linux Server (v. 7)
Detection
Get the installed version with the help of detect NVT and check if the version is vulnerable or not.
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2014-4337, CVE-2014-4338 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:N/A:P
Related Vulnerabilities