HTTP: CUPS Administration Interface CGI Overflow

This signature detects attempts to exploit a known vulnerability in the CUPS Administration Interface CGI. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

CUPS is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial of service. CUPS 1.3.5 is reported vulnerable; other versions may be affected as well. NOTE: This issue was originally covered in BID 28304 (Apple Mac OS X 2008-002 Multiple Security Vulnerabilities), but has been given its own record because further information has emerged.

Affected Products

Easy_software_products cups

Short Name
APP:CUPS:CGI-ADMIN-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Administration CGI CUPS CVE-2008-0047 Interface Overflow bid:28307
Release Date
04/08/2008
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3729
False Positive
Unknown
Vendors

Red_hat

Suse

Apple

Gentoo

Turbolinux

Easy_software_products

Slackware

Ubuntu

Mandriva

Debian

CVSS Score

9.3

Found a potential security threat?