Bug 436153 (CVE-2008-0047) - CVE-2008-0047 cups: heap based buffer overflow in cgiCompileSearch()
Summary: CVE-2008-0047 cups: heap based buffer overflow in cgiCompileSearch()
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-0047
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 436338 436339 440040 440041 440042
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-03-05 17:24 UTC by Tomas Hoger
Modified: 2023-05-11 12:52 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2008-04-09 06:22:50 UTC
Embargoed:


Attachments (Terms of Use)
Upstream patch (420 bytes, patch)
2008-03-05 17:25 UTC, Tomas Hoger
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0192 0 normal SHIPPED_LIVE Moderate: cups security update 2008-04-01 14:10:09 UTC

Description Tomas Hoger 2008-03-05 17:24:26 UTC
regenrecht has discovered a security issue affecting CUPS printing system, that
was reported to CUPS upstream via iDefense:

CUPS serves an interface on TCP port 631, which provides access to  
several CGI applications.

These applications are used to administer CUPS, and to provide
information about print jobs. These applications all use a common
search function called cgiCompileSearch(). This function takes a user
provided search expression, and compiles it into a regular expression.
By passing a malformed search request, an attacker can trigger a heap  
based buffer overflow.

In order to exploit this vulnerability remotely, the targeted host must
be sharing a printer(s) on the network. If a printer is not being
shared, CUPS only listens on the localhost interface, and the scope of
this vulnerability would be limited to local privilege escalation.

Versions affected:
CUPS 1.2.0 through 1.3.6

Upstream bug report:
http://www.cups.org/str.php?L2729

Acknowledgements:

Red Hat would like to thank "regenrecht" for reporting this issue.

Comment 1 Tomas Hoger 2008-03-05 17:25:43 UTC
Created attachment 296901 [details]
Upstream patch

Comment 2 Mark J. Cox 2008-03-06 12:15:29 UTC
This issue does not affect the version of cups as shipped in Red Hat Enterprise
Linux 3 or 4 (no help.cgi).

In Red Hat Enterprise Linux 5, help.cgi is included (as a PIE executable) and
runs as user lp group lp.

Comment 3 Mark J. Cox 2008-03-06 12:17:34 UTC
For CVSS v2 score using Access Vector: Local because by default the tcp
administrator interface is bound to localhost.

cvss2=4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P

Comment 7 Mark J. Cox 2008-03-07 10:33:57 UTC
Downgrading to moderate severity.  By default on RHEL, CUPS binds the tcp
administration interface to localhost.  Successful exploitation of this flaw
would yield user 'lp' group 'lp' privileges, but confined by the targeted
SELinux policy, enabled by default.

Comment 8 Tomas Hoger 2008-03-19 07:30:42 UTC
Public now via APPLE-SA-2008-03-18:

  http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html

Lifting embargo.

Comment 11 Fedora Update System 2008-04-01 16:20:18 UTC
cups-1.2.12-10.fc7 has been submitted as an update for Fedora 7

Comment 12 Fedora Update System 2008-04-09 05:11:45 UTC
cups-1.3.6-4.fc8 has been pushed to the Fedora 8 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 13 Fedora Update System 2008-04-09 05:13:08 UTC
cups-1.2.12-10.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.