Summary
Ubuntu Update for Linux kernel vulnerabilities USN-539-1
Solution
Please Install the Updated Packages.
Insight
Alin Rad Pop discovered that CUPS did not correctly validate buffer lengths when processing IPP tags. Remote attackers successfully exploiting this vulnerability would gain access to the non-root CUPS user in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile.
Affected
cupsys vulnerability on Ubuntu 6.06 LTS ,
Ubuntu 6.10 ,
Ubuntu 7.04 ,
Ubuntu 7.10
Severity
Classification
-
CVE CVE-2007-4351 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Ubuntu Update for emacs21 vulnerability USN-504-1
- Ubuntu Update for enscript vulnerability USN-660-1
- Ubuntu Update for apt-listchanges vulnerability USN-572-1
- Ubuntu Update for apturl, Epiphany, gecko-sharp, gnome-python-extras, liferea, rhythmbox, totem, ubufox, yelp update USN-930-2
- Ubuntu Update for enigmail vulnerability USN-427-1