Solution
Please Install the Updated Packages.
Insight
The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX(R) operating systems.
A flaw was found in the way CUPS handled the addition and removal of remote shared printers via IPP. A remote attacker could send malicious UDP IPP packets causing the CUPS daemon to attempt to dereference already freed memory and crash. (CVE-2008-0597)
A memory management flaw was found in the way CUPS handled the addition and removal of remote shared printers via IPP. When shared printer was removed, allocated memory was not properly freed, leading to a memory leak possibly causing CUPS daemon crash after exhausting available memory.
(CVE-2008-0596)
These issues were found during the investigation of CVE-2008-0882, which did not affect Red Hat Enterprise Linux 3.
Note that the default configuration of CUPS on Red Hat Enterprise Linux 3 allow requests of this type only from the local subnet.
In addition, these updated cups packages fix a bug that occurred when using the CUPS polling daemon. Excessive debugging log information was saved to the error_log file regardless of the LogLevel setting, which filled up disk space rapidly.
All CUPS users are advised to upgrade to these updated packages, which contain backported patches to resolve this issue.
Affected
cups on Red Hat Enterprise Linux AS version 3,
Red Hat Enterprise Linux ES version 3,
Red Hat Enterprise Linux WS version 3
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-0596, CVE-2008-0597, CVE-2008-0882 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities