SB2015070723 - Amazon Linux AMI update for cups



SB2015070723 - Amazon Linux AMI update for cups

Published: July 7, 2015

Security Bulletin ID SB2015070723
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Medium 33% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2014-9679)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

Integer underflow in the cupsRasterReadPixels function in filter/raster.c in CUPS before 2.0.2 allows remote attackers to have unspecified impact via a malformed compressed raster file, which triggers a buffer overflow.


2) Security Features (CVE-ID: CVE-2015-1158)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2) IPP_PRINT_JOB request, as demonstrated by replacing the configuration file and consequently executing arbitrary code.


3) Cross-site scripting (CVE-ID: CVE-2015-1159)

Vulnerability allows a remote attacker to perform Cross-site scripting attacks.

An input validation error exists in the cgi_puts function in cgi-bin/template.c in the template engine in CUPS before 2.0.3 when processing QUERY parameter to help/. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Remediation

Install update from vendor's website.