Red Hat Bugzilla – Bug 232243
CVE-2007-0720 Incomplete SSL negotiation prevents other clients from connecting to CUPS server
Last modified: 2008-02-22 05:28:13 EST
+++ This bug was initially created as a clone of Bug #232241 +++
Description of problem:
CUPS doesn't use separate workers for connections. During SSL
negotiation it does not accept new connections from anyone so
any user can DoS the server with unfinished negotiation.
Version-Release number of selected component (if applicable):
Both 1.2 <= 1.2.7 and 1.1 are affected.
I was able to reproduce on RHEL4, RHEL5.
FC6 (1.2.7) is already fixed.
SSL support needs to be enabled. Default in 1.2.
Steps to Reproduce:
1. Launch the attached reproducer (eventually modify appropriately)
2. Let it run for at least 10 secs (to ensure that the server is not patched)
3. Attempt another connection to the CUPS server.
The relevant fix:
http://www.cups.org/articles.php?L429+I10+T+P1+Q (r6110, r6081, r6079)
-- Additional comment from email@example.com on 2007-03-14 11:29 EST --
Created an attachment (id=150051)
CVE-2007-0720 CUPS incomplete SSL negotiation DoS reproducer
For 1.1, you'll likely use a different port number.
This was fixed for cups in Red Hat Enterprise Linux 5 in:
Tim, ok to close this one?