Red Hat Bugzilla – Full Text Bug Listing
|Summary:||CVE-2007-0720 Incomplete SSL negotiation prevents other clients from connecting to CUPS server|
|Product:||[Fedora] Fedora||Reporter:||Lubomir Kundrak <lkundrak>|
|Component:||cups||Assignee:||Tim Waugh <twaugh>|
|Status:||CLOSED ERRATA||QA Contact:|
|Fixed In Version:||1.2.8-1.fc5||Doc Type:||Bug Fix|
|Doc Text:||Story Points:||---|
|Last Closed:||2008-02-22 05:28:13 EST||Type:||---|
|oVirt Team:||---||RHEL 7.3 requirements from Atomic Host:|
|Bug Depends On:||232241|
Description Lubomir Kundrak 2007-03-14 11:32:48 EDT
+++ This bug was initially created as a clone of Bug #232241 +++ Description of problem: CUPS doesn't use separate workers for connections. During SSL negotiation it does not accept new connections from anyone so any user can DoS the server with unfinished negotiation. Version-Release number of selected component (if applicable): Both 1.2 <= 1.2.7 and 1.1 are affected. I was able to reproduce on RHEL4, RHEL5. FC6 (1.2.7) is already fixed. How reproducible: SSL support needs to be enabled. Default in 1.2. Steps to Reproduce: 1. Launch the attached reproducer (eventually modify appropriately) 2. Let it run for at least 10 secs (to ensure that the server is not patched) 3. Attempt another connection to the CUPS server. Actual results: Hang. Additional info: The relevant fix: http://www.cups.org/articles.php?L429+I10+T+P1+Q (r6110, r6081, r6079) -- Additional comment from firstname.lastname@example.org on 2007-03-14 11:29 EST -- Created an attachment (id=150051) CVE-2007-0720 CUPS incomplete SSL negotiation DoS reproducer For 1.1, you'll likely use a different port number.
Comment 1 Tomas Hoger 2008-02-22 05:15:08 EST
This was fixed for cups in Red Hat Enterprise Linux 5 in: https://rhn.redhat.com/errata/RHSA-2007-0123.html Tim, ok to close this one?
Comment 2 Tim Waugh 2008-02-22 05:28:13 EST