USN-952-1: CUPS vulnerabilities

21 June 2010

cups, cupsys vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 10.04 LTS
  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.04 LTS
  • Ubuntu 6.06 LTS

Summary

Software Description

  • cups
  • cupsys

Details

Adrian Pastor and Tim Starling discovered that the CUPS web interface incorrectly protected against cross-site request forgery (CSRF) attacks. If an authenticated user were tricked into visiting a malicious website while logged into CUPS, a remote attacker could modify the CUPS configuration and possibly steal confidential data. (CVE-2010-0540)

It was discovered that CUPS did not properly handle memory allocations in the texttops filter. If a user or automated system were tricked into printing a crafted text file, a remote attacker could cause a denial of service or possibly execute arbitrary code with privileges of the CUPS user (lp). (CVE-2010-0542)

Luca Carettoni discovered that the CUPS web interface incorrectly handled form variables. A remote attacker who had access to the CUPS web interface could use this flaw to read a limited amount of memory from the cupsd process and possibly obtain confidential data. (CVE-2010-1748)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 10.04 LTS
cups - 1.4.3-1ubuntu1.2
Ubuntu 9.10
cups - 1.4.1-5ubuntu2.6
Ubuntu 9.04
cups - 1.3.9-17ubuntu3.9
Ubuntu 8.04 LTS
cupsys - 1.3.7-1ubuntu3.11
Ubuntu 6.06 LTS
cupsys - 1.2.2-0ubuntu0.6.06.19

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References