APP: CUPS HPGL Filter Overflow

This signature detects attempts to exploit a known vulnerability in the Common Unix Printing System (CUPS) HP Graphic Language (HPGL) Filter. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server, usually the line printer daemon.

Extended Description

CUPS is prone to a remote code-execution vulnerability caused by an error in the 'HP-GL/2 filter. Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely cause a denial-of-service condition. Note that local users may also exploit this vulnerability to elevate privileges. Successful remote exploits may require printer sharing to be enabled on the vulnerable system. The issue affects versions prior to CUPS 1.3.9. NOTE: This issue was previously discussed in BID 31681 (Apple Mac OS X 2008-007 Multiple Security Vulnerabilities), but has been assigned its own record to better document the vulnerability.

Affected Products

Avaya proactive_contact

Short Name
APP:CUPS:HPGL-PC-OF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
CUPS CVE-2008-3641 Filter HPGL Overflow bid:31688
Release Date
12/15/2008
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3725
False Positive
Unknown
Vendors

Red_hat

Suse

Apple

Gentoo

Sun

Rpath

Turbolinux

Avaya

Easy_software_products

Pardus

Slackware

Ubuntu

Mandriva

Debian

CVSS Score

10.0

Found a potential security threat?