-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                   ESB-2007.0854 -- [UNIX/Linux][RedHat]
                Important: cups security and bug fix update
                              1 November 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              CUPS
Publisher:            Red Hat
Impact:               Execute Arbitrary Code/Commands
                      Denial of Service
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-4351

Original Bulletin:    https://rhn.redhat.com/errata/RHSA-2007-1020.html
                      http://www.cups.org/str.php?L2561

Comment: This advisory references vulnerabilities in products which run on
         platforms other than Red Hat Enterprise Linux. It is recommended
         that administrators running CUPS check for an updated version of
         the software for their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Important: cups security and bug fix update
Advisory ID:       RHSA-2007:1020-01
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-1020.html
Issue date:        2007-10-31
Updated on:        2007-10-31
Product:           Red Hat Enterprise Linux
CVE Names:         CVE-2007-4351 
- - ---------------------------------------------------------------------

1. Summary:

Updated CUPS packages that fix a security issue in the Internet Printing
Protocol (IPP) handling and correct some bugs are now available for Red Hat
Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
RHEL Desktop Workstation (v. 5 client) - i386, x86_64
Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64

3. Problem description:

The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX(R) operating systems.

A flaw was found in the way CUPS handles certain Internet Printing Protocol
(IPP) tags. A remote attacker who is able to connect to the IPP TCP port
could send a malicious request causing the CUPS daemon to crash, or
potentially execute arbitrary code. Please note that the default CUPS
configuration does not allow remote hosts to connect to the IPP TCP port.
(CVE-2007-4351)

Red Hat would like to thank Alin Rad Pop for reporting this issue.

All CUPS users are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue.

In addition, the following bugs were fixed:

* the CUPS service has been changed to start after sshd, to avoid causing
delays when logging in when the system is booted.

* the logrotate settings have been adjusted so they do not cause CUPS to
reload its configuration. This is to avoid re-printing the current job,
which could occur when it was a long-running job.

* a bug has been fixed in the handling of the If-Modified-Since: HTTP
header.

* in the LSPP configuration, labels for labeled jobs did not line-wrap.
This has been fixed.

* an access check in the LSPP configuration has been made more secure.

* the cups-lpd service no longer ignores the "-odocument-format=..."
option.

* a memory allocation bug has been fixed in cupsd.

* support for UNIX domain sockets authentication without passwords has been
added.

* in the LSPP configuration, a problem that could lead to cupsd crashing
has been fixed.

* the error handling in the initscript has been improved.

* The job-originating-host-name attribute was not correctly set for jobs
submitted via the cups-lpd service. This has been fixed.

* a problem with parsing IPv6 addresses in the configuration file has been
fixed.

* a problem that could lead to cupsd crashing when it failed to open a
"file:" URI has been fixed.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bug IDs fixed (http://bugzilla.redhat.com/):

213828 - Cups starts as S55cups, before sshd
228107 - [LSPP] Labels for labeled printing don't linewrap
229673 - [LSPP] cups is overriding mls when querying jobs with lpq -al
230073 - cups-lpd : server-args has no effect
230613 - [LSPP] cups is allowing users to delete other user's job
231522 - [LSPP] cupsd crash
237953 - Wrong init script
240223 - cups-lpd doesn't set 'job-originating-host-name'
241400 - IPV6 addresses not accepted in  "Allow From" directives
250415 - cupsd crashes when failing to open a file: URI
345091 - CVE-2007-4351 cups boundary error

6. RPMs required:

Red Hat Enterprise Linux Desktop (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cups-1.2.4-11.14.el5_1.1.src.rpm
d4024b6f80540a02718c91f739a8bf05  cups-1.2.4-11.14.el5_1.1.src.rpm

i386:
04105308f4089ea32df6a2d8bf540d5a  cups-1.2.4-11.14.el5_1.1.i386.rpm
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
b4e79e982cc21036b2848f6ded17ecdd  cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
0ad495e3b1565dcdf0f75eac2eb5e8a7  cups-lpd-1.2.4-11.14.el5_1.1.i386.rpm

x86_64:
0a7fe3996a0c8ea2feb144fa07f76d98  cups-1.2.4-11.14.el5_1.1.x86_64.rpm
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
a3f2712e792df40303b4c861864673c7  cups-debuginfo-1.2.4-11.14.el5_1.1.x86_64.rpm
b4e79e982cc21036b2848f6ded17ecdd  cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
056a430c4c1308c44c88441639e312b9  cups-libs-1.2.4-11.14.el5_1.1.x86_64.rpm
c9d27661f6732bda4ae0b30e8f0aa725  cups-lpd-1.2.4-11.14.el5_1.1.x86_64.rpm

RHEL Desktop Workstation (v. 5 client):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cups-1.2.4-11.14.el5_1.1.src.rpm
d4024b6f80540a02718c91f739a8bf05  cups-1.2.4-11.14.el5_1.1.src.rpm

i386:
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
b4fe280e49d3dcf3c63fd54524390a09  cups-devel-1.2.4-11.14.el5_1.1.i386.rpm

x86_64:
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
a3f2712e792df40303b4c861864673c7  cups-debuginfo-1.2.4-11.14.el5_1.1.x86_64.rpm
b4fe280e49d3dcf3c63fd54524390a09  cups-devel-1.2.4-11.14.el5_1.1.i386.rpm
263d1d22a7c9be2f4dbd0c8b43b80e2a  cups-devel-1.2.4-11.14.el5_1.1.x86_64.rpm

Red Hat Enterprise Linux (v. 5 server):

SRPMS:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/cups-1.2.4-11.14.el5_1.1.src.rpm
d4024b6f80540a02718c91f739a8bf05  cups-1.2.4-11.14.el5_1.1.src.rpm

i386:
04105308f4089ea32df6a2d8bf540d5a  cups-1.2.4-11.14.el5_1.1.i386.rpm
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
b4fe280e49d3dcf3c63fd54524390a09  cups-devel-1.2.4-11.14.el5_1.1.i386.rpm
b4e79e982cc21036b2848f6ded17ecdd  cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
0ad495e3b1565dcdf0f75eac2eb5e8a7  cups-lpd-1.2.4-11.14.el5_1.1.i386.rpm

ia64:
af37a1ebfdf26598d5897bc9507e78f3  cups-1.2.4-11.14.el5_1.1.ia64.rpm
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
75e856f97b8a1ae6d183ed3d4fdd8d68  cups-debuginfo-1.2.4-11.14.el5_1.1.ia64.rpm
7ac227b7833556eedb6ecba08ba6bca8  cups-devel-1.2.4-11.14.el5_1.1.ia64.rpm
b4e79e982cc21036b2848f6ded17ecdd  cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
50caa7e5a1665b947b6d4ce812b4c082  cups-libs-1.2.4-11.14.el5_1.1.ia64.rpm
887f0418bc37a56c2d1ac8d718b5f8b2  cups-lpd-1.2.4-11.14.el5_1.1.ia64.rpm

ppc:
6aa115515899f2ee4c7cea725a0ccabb  cups-1.2.4-11.14.el5_1.1.ppc.rpm
fbb63189e62c3639add434d7a9522b25  cups-debuginfo-1.2.4-11.14.el5_1.1.ppc.rpm
0109adc637556efb2ebfc60f345e685f  cups-debuginfo-1.2.4-11.14.el5_1.1.ppc64.rpm
3655447b3b729453387439aa0aee91af  cups-devel-1.2.4-11.14.el5_1.1.ppc.rpm
bd9683c6898cdecf1064bdf9237a26f6  cups-devel-1.2.4-11.14.el5_1.1.ppc64.rpm
55cf96a356456cc9c97260424a180e74  cups-libs-1.2.4-11.14.el5_1.1.ppc.rpm
612f14d317b075c75b3ff6a879569a97  cups-libs-1.2.4-11.14.el5_1.1.ppc64.rpm
9ee96feb5dd1cb42503decbdc776d521  cups-lpd-1.2.4-11.14.el5_1.1.ppc.rpm

s390x:
cc0e592487e1443afe2632ce8132c200  cups-1.2.4-11.14.el5_1.1.s390x.rpm
cb49bab7c8c4d595dbefff730582311d  cups-debuginfo-1.2.4-11.14.el5_1.1.s390.rpm
d6cd0e3e4eb460f33900ff066142c008  cups-debuginfo-1.2.4-11.14.el5_1.1.s390x.rpm
a4e18a2797c91483bffabefcb3bd257c  cups-devel-1.2.4-11.14.el5_1.1.s390.rpm
00fbb56f9d73eec63607ea20febfa616  cups-devel-1.2.4-11.14.el5_1.1.s390x.rpm
754c8b7459b07318a7ee21e3947e0197  cups-libs-1.2.4-11.14.el5_1.1.s390.rpm
52ee99fe60dec2c85ef0489642ab5b6e  cups-libs-1.2.4-11.14.el5_1.1.s390x.rpm
8779ba5c0746dad6c3899561b807b552  cups-lpd-1.2.4-11.14.el5_1.1.s390x.rpm

x86_64:
0a7fe3996a0c8ea2feb144fa07f76d98  cups-1.2.4-11.14.el5_1.1.x86_64.rpm
a9214c78f171330d64a2b59932b5ca12  cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm
a3f2712e792df40303b4c861864673c7  cups-debuginfo-1.2.4-11.14.el5_1.1.x86_64.rpm
b4fe280e49d3dcf3c63fd54524390a09  cups-devel-1.2.4-11.14.el5_1.1.i386.rpm
263d1d22a7c9be2f4dbd0c8b43b80e2a  cups-devel-1.2.4-11.14.el5_1.1.x86_64.rpm
b4e79e982cc21036b2848f6ded17ecdd  cups-libs-1.2.4-11.14.el5_1.1.i386.rpm
056a430c4c1308c44c88441639e312b9  cups-libs-1.2.4-11.14.el5_1.1.x86_64.rpm
c9d27661f6732bda4ae0b30e8f0aa725  cups-lpd-1.2.4-11.14.el5_1.1.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351
http://www.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFHKIjVXlSAg2UNWIIRApI+AKC3e/KnYzwl6suwIjq8+KhUWOX9MACgxEQ/
1vakibpF+OBG68Gso2X+FdY=
=ib5C
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRykmmih9+71yA2DNAQIF7wP8DYleB1Zfd+mPo1SJ9AEoPgJUOoXnocqP
eV0N5vHlAh7w6sM00t7wxufvgvRSjR9Ca+Fb82kHBe9VIlenPdiC9OFOEG1dUTNE
EkToIPmyFxE4tPqFadHyKCsF1t2Q4Iw3lV5oSbF+heSwCnbIPdXY0ggJ3SYOONVo
pzheyZgxXXQ=
=kY8Z
-----END PGP SIGNATURE-----