Bug 591983 (CVE-2010-1748)

Summary: CVE-2010-1748 cups: web interface memory disclosure
Product: [Other] Security Response Reporter: Vincent Danen <vdanen>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jlieskov, jpopelka, security-response-team, twaugh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-07-27 05:27:30 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 590076, 590079, 590081, 590083, 590084, 590086, 605399    
Bug Blocks:    
Attachments:
Description Flags
proposed upstream patch none

Description Vincent Danen 2010-05-13 15:45:45 UTC
An unitialized memory read issue exists in the CUPS web interface in how it handles form variables.  An attacker with access to the CUPS web interface could possibly read a limited amount of memory from the cupsd process.  In cgi-bin/var.c, when processing form variables that can come from an unauthenticated user, the cgi_initialize_string() function expects a 2-character hex code after the % character.  If the last character of data is the % character, then it will append a mangled version of the nul terminator and one more byte following the end of data to the output.  The loop will continue appending the contents of memory past the end of data to the output, until another nul byte is read.  A GET request will disclose memory from the environment variable list, and a POST request will disclose memory from the heap.

Upstream CUPS 1.4.4 has corrected this flaw.

Acknowledgements:

Red Hat would like to thank the Apple Product Security team for responsibly reporting this flaw. Upstream acknowledges Luca Carettoni as the original reporter.

Comment 3 Vincent Danen 2010-05-13 16:00:40 UTC
Created attachment 413803 [details]
proposed upstream patch

Comment 6 Vincent Danen 2010-06-15 22:30:52 UTC
This is public now via http://support.apple.com/kb/HT4188

Comment 7 Vincent Danen 2010-06-17 20:34:14 UTC
Created cups tracking bugs for this issue

Affects: fedora-all [bug 605399]

Comment 8 errata-xmlrpc 2010-06-17 22:18:54 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3
  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 5

Via RHSA-2010:0490 https://rhn.redhat.com/errata/RHSA-2010-0490.html

Comment 9 Fedora Update System 2010-06-18 11:03:20 UTC
cups-1.4.4-1.fc13 has been submitted as an update for Fedora 13.
http://admin.fedoraproject.org/updates/cups-1.4.4-1.fc13

Comment 10 Fedora Update System 2010-06-18 11:04:14 UTC
cups-1.4.4-1.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/cups-1.4.4-1.fc12

Comment 11 Fedora Update System 2010-06-18 11:04:56 UTC
cups-1.4.4-1.fc11 has been submitted as an update for Fedora 11.
http://admin.fedoraproject.org/updates/cups-1.4.4-1.fc11

Comment 12 Fedora Update System 2010-06-24 12:22:28 UTC
cups-1.4.4-4.fc13 has been submitted as an update for Fedora 13.
http://admin.fedoraproject.org/updates/cups-1.4.4-4.fc13

Comment 13 Fedora Update System 2010-06-25 18:10:18 UTC
cups-1.4.4-4.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 14 Fedora Update System 2010-07-01 18:44:17 UTC
cups-1.4.4-5.fc13 has been pushed to the Fedora 13 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 15 Fedora Update System 2010-07-27 02:45:37 UTC
cups-1.4.4-5.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.