From owner-freebsd-ports-bugs@FreeBSD.ORG Tue May 5 22:00:07 2009 Return-Path: Delivered-To: freebsd-ports-bugs@hub.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 38E5A106568C; Tue, 5 May 2009 22:00:07 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:4f8:fff6::28]) by mx1.freebsd.org (Postfix) with ESMTP id 146D28FC25; Tue, 5 May 2009 22:00:07 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) by freefall.freebsd.org (8.14.3/8.14.3) with ESMTP id n45M06AK056429; Tue, 5 May 2009 22:00:06 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.3/8.14.3/Submit) id n45M06e1056428; Tue, 5 May 2009 22:00:06 GMT (envelope-from gnats) Resent-Date: Tue, 5 May 2009 22:00:06 GMT Resent-Message-Id: <200905052200.n45M06e1056428@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@freebsd.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Cc: rea-fbsd@codelabs.ru, dinoex@freebsd.org Resent-Reply-To: FreeBSD-gnats-submit@freebsd.org, Eygene Ryabinkin Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id D4F64106566C for ; Tue, 5 May 2009 21:51:43 +0000 (UTC) (envelope-from rea-fbsd@codelabs.ru) Received: from 0.mx.codelabs.ru (0.mx.codelabs.ru [144.206.177.45]) by mx1.freebsd.org (Postfix) with ESMTP id 7F2DD8FC13 for ; Tue, 5 May 2009 21:51:43 +0000 (UTC) (envelope-from rea-fbsd@codelabs.ru) Received: from amnesiac.at.no.dns ([91.78.118.163]) by 0.mx.codelabs.ru with esmtps (TLSv1:CAMELLIA256-SHA:256) id 1M1SYA-000HKm-Dg for FreeBSD-gnats-submit@freebsd.org; Wed, 06 May 2009 01:51:42 +0400 Message-Id: <20090505214602.389341725F@amnesiac.at.no.dns> Date: Wed, 6 May 2009 01:46:02 +0400 (MSD) From: Eygene Ryabinkin To: FreeBSD-gnats-submit@freebsd.org X-Send-Pr-Version: 3.113 X-GNATS-Notify: rea-fbsd@codelabs.ru, dinoex@freebsd.org Cc: Subject: ports/134247: [vuxml] print/cups-base: document vulnerabilities fixed in 1.3.10 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: Eygene Ryabinkin List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 05 May 2009 22:00:08 -0000 >Number: 134247 >Category: ports >Synopsis: [vuxml] print/cups-base: document vulnerabilities fixed in 1.3.10 >Confidential: no >Severity: serious >Priority: medium >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Tue May 05 22:00:06 UTC 2009 >Closed-Date: >Last-Modified: >Originator: Eygene Ryabinkin >Release: FreeBSD 8.0-CURRENT amd64 >Organization: Code Labs >Environment: System: FreeBSD 8.0-CURRENT amd64 >Description: Some vulnerabilities were fixed in CUPS 1.3.10: [1] >How-To-Repeat: [1] http://www.gentoo.org/security/en/glsa/glsa-200904-20.xml >Fix: The following VuXML entry should be evaluated and added: --- vuln.xml begins here --- cups -- remote code execution and DNS rebinding cups-base 1.3.10

Gentoo security team summarizes:

The following issues were reported in CUPS:

  • iDefense reported an integer overflow in the _cupsImageReadTIFF() function in the "imagetops" filter, leading to a heap-based buffer overflow (CVE-2009-0163).
  • Aaron Siegel of Apple Product Security reported that the CUPS web interface does not verify the content of the "Host" HTTP header properly (CVE-2009-0164).
  • Braden Thomas and Drew Yao of Apple Product Security reported that CUPS is vulnerable to CVE-2009-0146, CVE-2009-0147 and CVE-2009-0166, found earlier in xpdf and poppler.

A remote attacker might send or entice a user to send a specially crafted print job to CUPS, possibly resulting in the execution of arbitrary code with the privileges of the configured CUPS user -- by default this is "lp", or a Denial of Service. Furthermore, the web interface could be used to conduct DNS rebinding attacks.

CVE-2009-0163 CVE-2009-0164 CVE-2009-0146 CVE-2009-0147 CVE-2009-0166 34571 34665 34568 http://www.cups.org/articles.php?L582 2009-05-05 TODAY
--- vuln.xml ends here --- >Release-Note: >Audit-Trail: >Unformatted: