Published:
01 November 2007
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2007.0854 -- [UNIX/Linux][RedHat] Important: cups security and bug fix update 1 November 2007 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: CUPS Publisher: Red Hat Impact: Execute Arbitrary Code/Commands Denial of Service Access: Remote/Unauthenticated CVE Names: CVE-2007-4351 Original Bulletin: https://rhn.redhat.com/errata/RHSA-2007-1020.html http://www.cups.org/str.php?L2561 Comment: This advisory references vulnerabilities in products which run on platforms other than Red Hat Enterprise Linux. It is recommended that administrators running CUPS check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Important: cups security and bug fix update Advisory ID: RHSA-2007:1020-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2007-1020.html Issue date: 2007-10-31 Updated on: 2007-10-31 Product: Red Hat Enterprise Linux CVE Names: CVE-2007-4351 - - --------------------------------------------------------------------- 1. Summary: Updated CUPS packages that fix a security issue in the Internet Printing Protocol (IPP) handling and correct some bugs are now available for Red Hat Enterprise Linux 5. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 3. Problem description: The Common UNIX Printing System (CUPS) provides a portable printing layer for UNIX(R) operating systems. A flaw was found in the way CUPS handles certain Internet Printing Protocol (IPP) tags. A remote attacker who is able to connect to the IPP TCP port could send a malicious request causing the CUPS daemon to crash, or potentially execute arbitrary code. Please note that the default CUPS configuration does not allow remote hosts to connect to the IPP TCP port. (CVE-2007-4351) Red Hat would like to thank Alin Rad Pop for reporting this issue. All CUPS users are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. In addition, the following bugs were fixed: * the CUPS service has been changed to start after sshd, to avoid causing delays when logging in when the system is booted. * the logrotate settings have been adjusted so they do not cause CUPS to reload its configuration. This is to avoid re-printing the current job, which could occur when it was a long-running job. * a bug has been fixed in the handling of the If-Modified-Since: HTTP header. * in the LSPP configuration, labels for labeled jobs did not line-wrap. This has been fixed. * an access check in the LSPP configuration has been made more secure. * the cups-lpd service no longer ignores the "-odocument-format=..." option. * a memory allocation bug has been fixed in cupsd. * support for UNIX domain sockets authentication without passwords has been added. * in the LSPP configuration, a problem that could lead to cupsd crashing has been fixed. * the error handling in the initscript has been improved. * The job-originating-host-name attribute was not correctly set for jobs submitted via the cups-lpd service. This has been fixed. * a problem with parsing IPv6 addresses in the configuration file has been fixed. * a problem that could lead to cupsd crashing when it failed to open a "file:" URI has been fixed. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bug IDs fixed (http://bugzilla.redhat.com/): 213828 - Cups starts as S55cups, before sshd 228107 - [LSPP] Labels for labeled printing don't linewrap 229673 - [LSPP] cups is overriding mls when querying jobs with lpq -al 230073 - cups-lpd : server-args has no effect 230613 - [LSPP] cups is allowing users to delete other user's job 231522 - [LSPP] cupsd crash 237953 - Wrong init script 240223 - cups-lpd doesn't set 'job-originating-host-name' 241400 - IPV6 addresses not accepted in "Allow From" directives 250415 - cupsd crashes when failing to open a file: URI 345091 - CVE-2007-4351 cups boundary error 6. RPMs required: Red Hat Enterprise Linux Desktop (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cups-1.2.4-11.14.el5_1.1.src.rpm d4024b6f80540a02718c91f739a8bf05 cups-1.2.4-11.14.el5_1.1.src.rpm i386: 04105308f4089ea32df6a2d8bf540d5a cups-1.2.4-11.14.el5_1.1.i386.rpm a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm b4e79e982cc21036b2848f6ded17ecdd cups-libs-1.2.4-11.14.el5_1.1.i386.rpm 0ad495e3b1565dcdf0f75eac2eb5e8a7 cups-lpd-1.2.4-11.14.el5_1.1.i386.rpm x86_64: 0a7fe3996a0c8ea2feb144fa07f76d98 cups-1.2.4-11.14.el5_1.1.x86_64.rpm a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm a3f2712e792df40303b4c861864673c7 cups-debuginfo-1.2.4-11.14.el5_1.1.x86_64.rpm b4e79e982cc21036b2848f6ded17ecdd cups-libs-1.2.4-11.14.el5_1.1.i386.rpm 056a430c4c1308c44c88441639e312b9 cups-libs-1.2.4-11.14.el5_1.1.x86_64.rpm c9d27661f6732bda4ae0b30e8f0aa725 cups-lpd-1.2.4-11.14.el5_1.1.x86_64.rpm RHEL Desktop Workstation (v. 5 client): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/cups-1.2.4-11.14.el5_1.1.src.rpm d4024b6f80540a02718c91f739a8bf05 cups-1.2.4-11.14.el5_1.1.src.rpm i386: a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm b4fe280e49d3dcf3c63fd54524390a09 cups-devel-1.2.4-11.14.el5_1.1.i386.rpm x86_64: a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm a3f2712e792df40303b4c861864673c7 cups-debuginfo-1.2.4-11.14.el5_1.1.x86_64.rpm b4fe280e49d3dcf3c63fd54524390a09 cups-devel-1.2.4-11.14.el5_1.1.i386.rpm 263d1d22a7c9be2f4dbd0c8b43b80e2a cups-devel-1.2.4-11.14.el5_1.1.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): SRPMS: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/cups-1.2.4-11.14.el5_1.1.src.rpm d4024b6f80540a02718c91f739a8bf05 cups-1.2.4-11.14.el5_1.1.src.rpm i386: 04105308f4089ea32df6a2d8bf540d5a cups-1.2.4-11.14.el5_1.1.i386.rpm a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm b4fe280e49d3dcf3c63fd54524390a09 cups-devel-1.2.4-11.14.el5_1.1.i386.rpm b4e79e982cc21036b2848f6ded17ecdd cups-libs-1.2.4-11.14.el5_1.1.i386.rpm 0ad495e3b1565dcdf0f75eac2eb5e8a7 cups-lpd-1.2.4-11.14.el5_1.1.i386.rpm ia64: af37a1ebfdf26598d5897bc9507e78f3 cups-1.2.4-11.14.el5_1.1.ia64.rpm a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm 75e856f97b8a1ae6d183ed3d4fdd8d68 cups-debuginfo-1.2.4-11.14.el5_1.1.ia64.rpm 7ac227b7833556eedb6ecba08ba6bca8 cups-devel-1.2.4-11.14.el5_1.1.ia64.rpm b4e79e982cc21036b2848f6ded17ecdd cups-libs-1.2.4-11.14.el5_1.1.i386.rpm 50caa7e5a1665b947b6d4ce812b4c082 cups-libs-1.2.4-11.14.el5_1.1.ia64.rpm 887f0418bc37a56c2d1ac8d718b5f8b2 cups-lpd-1.2.4-11.14.el5_1.1.ia64.rpm ppc: 6aa115515899f2ee4c7cea725a0ccabb cups-1.2.4-11.14.el5_1.1.ppc.rpm fbb63189e62c3639add434d7a9522b25 cups-debuginfo-1.2.4-11.14.el5_1.1.ppc.rpm 0109adc637556efb2ebfc60f345e685f cups-debuginfo-1.2.4-11.14.el5_1.1.ppc64.rpm 3655447b3b729453387439aa0aee91af cups-devel-1.2.4-11.14.el5_1.1.ppc.rpm bd9683c6898cdecf1064bdf9237a26f6 cups-devel-1.2.4-11.14.el5_1.1.ppc64.rpm 55cf96a356456cc9c97260424a180e74 cups-libs-1.2.4-11.14.el5_1.1.ppc.rpm 612f14d317b075c75b3ff6a879569a97 cups-libs-1.2.4-11.14.el5_1.1.ppc64.rpm 9ee96feb5dd1cb42503decbdc776d521 cups-lpd-1.2.4-11.14.el5_1.1.ppc.rpm s390x: cc0e592487e1443afe2632ce8132c200 cups-1.2.4-11.14.el5_1.1.s390x.rpm cb49bab7c8c4d595dbefff730582311d cups-debuginfo-1.2.4-11.14.el5_1.1.s390.rpm d6cd0e3e4eb460f33900ff066142c008 cups-debuginfo-1.2.4-11.14.el5_1.1.s390x.rpm a4e18a2797c91483bffabefcb3bd257c cups-devel-1.2.4-11.14.el5_1.1.s390.rpm 00fbb56f9d73eec63607ea20febfa616 cups-devel-1.2.4-11.14.el5_1.1.s390x.rpm 754c8b7459b07318a7ee21e3947e0197 cups-libs-1.2.4-11.14.el5_1.1.s390.rpm 52ee99fe60dec2c85ef0489642ab5b6e cups-libs-1.2.4-11.14.el5_1.1.s390x.rpm 8779ba5c0746dad6c3899561b807b552 cups-lpd-1.2.4-11.14.el5_1.1.s390x.rpm x86_64: 0a7fe3996a0c8ea2feb144fa07f76d98 cups-1.2.4-11.14.el5_1.1.x86_64.rpm a9214c78f171330d64a2b59932b5ca12 cups-debuginfo-1.2.4-11.14.el5_1.1.i386.rpm a3f2712e792df40303b4c861864673c7 cups-debuginfo-1.2.4-11.14.el5_1.1.x86_64.rpm b4fe280e49d3dcf3c63fd54524390a09 cups-devel-1.2.4-11.14.el5_1.1.i386.rpm 263d1d22a7c9be2f4dbd0c8b43b80e2a cups-devel-1.2.4-11.14.el5_1.1.x86_64.rpm b4e79e982cc21036b2848f6ded17ecdd cups-libs-1.2.4-11.14.el5_1.1.i386.rpm 056a430c4c1308c44c88441639e312b9 cups-libs-1.2.4-11.14.el5_1.1.x86_64.rpm c9d27661f6732bda4ae0b30e8f0aa725 cups-lpd-1.2.4-11.14.el5_1.1.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4351 http://www.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact/ Copyright 2007 Red Hat, Inc. - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFHKIjVXlSAg2UNWIIRApI+AKC3e/KnYzwl6suwIjq8+KhUWOX9MACgxEQ/ 1vakibpF+OBG68Gso2X+FdY= =ib5C - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBRykmmih9+71yA2DNAQIF7wP8DYleB1Zfd+mPo1SJ9AEoPgJUOoXnocqP eV0N5vHlAh7w6sM00t7wxufvgvRSjR9Ca+Fb82kHBe9VIlenPdiC9OFOEG1dUTNE EkToIPmyFxE4tPqFadHyKCsF1t2Q4Iw3lV5oSbF+heSwCnbIPdXY0ggJ3SYOONVo pzheyZgxXXQ= =kY8Z -----END PGP SIGNATURE-----