Bug 433758 (CVE-2008-0882) - CVE-2008-0882 cups: double free vulnerability in process_browse_data()
Summary: CVE-2008-0882 cups: double free vulnerability in process_browse_data()
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: CVE-2008-0882
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 433766 433767 433802 433803
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-02-21 10:26 UTC by Tomas Hoger
Modified: 2019-09-29 12:23 UTC (History)
2 users (show)

Fixed In Version: 1.3.6-2.fc8
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-02-26 00:23:42 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0157 normal SHIPPED_LIVE Important: cups security update 2008-02-21 21:30:45 UTC

Description Tomas Hoger 2008-02-21 10:26:33 UTC
Secunia has released and advisory affecting cups printing system:

  http://secunia.com/advisories/28994/

  Description:
  A vulnerability has been discovered in CUPS, which can be exploited by
  malicious people to cause a DoS (Denial of Service) or to potentially
  compromise a vulnerable system.

  The vulnerability is caused due to an error within the
  "process_browse_data()" function when adding printers and classes. This
  can be exploited to free the same buffer twice by sending specially
  crafted browser packets to the UDP port on which cupsd is listening (by
  default port 631/UDP).

  Successful exploitation may allow execution of arbitrary code.

  The vulnerability is confirmed in version 1.3.5. Prior versions may also
  be affected.

  Solution:
  Update to version 1.3.6.

Upstream bug report:
http://www.cups.org/str.php?L2656

Upstream patch:
http://www.cups.org/strfiles/2656/str2656.patch

Comment 1 Tomas Hoger 2008-02-21 10:42:14 UTC
Further info from Tim Waugh:

  In Red Hat Enterprise Linux 3, 4 and 5 we ship with 'BrowseAllow
  @LOCAL' (the upstream default at the time), which causes CUPS to drop
  UDP Browse packets from source IP addresses not matching a local subnet
  (i.e. interface address & netmask, for each interface).

  In Fedora we ship with 'BrowseAll All' in the CUPS configuration,
  which allows all UDP Browse packets in.

Communication to 631/udp is allowed by default in iptables configuration.


Comment 7 Mark J. Cox 2008-02-21 16:07:55 UTC
We've determined through source code analysis that the older versions of CUPS as
shipped in Red Hat Enterprise Linux 3 and 4 do not contain the code that can
cause this double-free to occur.  We also tested this using a reproducer.

Red Hat Enterprise Linux 5 does have the double-free and we can cause CUPS to
remotely crash using an internal reproducer.  However the glibc pointer checking
as part of Enterprise Linux 5 limits the exploitability of this issue to just a
crash of CUPS and not the ability to execute arbitrary code.

Comment 11 Fedora Update System 2008-02-22 13:46:20 UTC
cups-1.2.12-9.fc7 has been submitted as an update for Fedora 7

Comment 12 Fedora Update System 2008-02-26 00:23:33 UTC
cups-1.3.6-2.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 13 Fedora Update System 2008-02-26 00:26:08 UTC
cups-1.2.12-9.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.