HTTP: CUPS Administration Interface CGI Overflow
This signature detects attempts to exploit a known vulnerability in the CUPS Administration Interface CGI. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Extended Description
CUPS is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial of service. CUPS 1.3.5 is reported vulnerable; other versions may be affected as well. NOTE: This issue was originally covered in BID 28304 (Apple Mac OS X 2008-002 Multiple Security Vulnerabilities), but has been given its own record because further information has emerged.
Affected Products
Easy_software_products cups
References
BugTraq: 28307
CVE: CVE-2008-0047
URL: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Suse
Apple
Gentoo
Turbolinux
Easy_software_products
Slackware
Ubuntu
Mandriva
Debian
9.3