CUPS Denial of Service Attack Vulnerability

Created at 09:00 May 27, 2003 by mike, last modified at 10:41 May 27, 2003

A denial of service attack vulnerability, STR #75, was discovered and reported by Red Hat which allows a malicious user to block the CUPS scheduler while servicing a request, effectively preventing other users from accessing the scheduler. This vulnerability exists for both local and remote accesses to all CUPS versions up to and including 1.1.19rc3.

A patch for CUPS 1.1.18 is available on the STR page. CUPS 1.1.19rc4 and higher do not contain this vulnerability and do not require any additional patches. Download  ·  Home Page  ·  Listing


Comments

Submit Comment

From Anonymous, 08:15 Jun 09, 2003 (score=4)

Have the sources that are available now for 1.1.18 been patched? Reply

From Mike Sweet, 15:40 Jun 11, 2003 (score=1)

No, you need to apply the patch for 1.1.18 if you download the 1.1.18 sources.

However, if you download 1.1.19 you don't need the patch. Reply

From Anonymous, 08:16 Jun 09, 2003 (score=2)

If there is a 1.1.19, why are the 1.1.19rc's being added to? Reply

From Mike Sweet, 15:41 Jun 11, 2003 (score=1)

They aren't - some of the 1.1.19 release candidates contained the fix, some didn't. Get the final 1.1.19 release... Reply

From Anonymous, 14:24 May 29, 2003 (score=1)

it's very hard to avoid this case for current CUPS implementation. blocking socket and one big select().

If a client open a socket to a CUPS server and send a "POST" do not send other thing and do not close socket, the CUPS server will hang there. Reply