Bug 591983 (CVE-2010-1748) - CVE-2010-1748 cups: web interface memory disclosure
Summary: CVE-2010-1748 cups: web interface memory disclosure
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2010-1748
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 590076 590079 590081 590083 590084 590086 605399
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-05-13 15:45 UTC by Vincent Danen
Modified: 2019-09-29 12:36 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-07-27 05:27:30 UTC


Attachments (Terms of Use)
proposed upstream patch (393 bytes, patch)
2010-05-13 16:00 UTC, Vincent Danen
no flags Details | Diff


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0490 normal SHIPPED_LIVE Important: cups security update 2010-06-17 22:18:30 UTC
CUPS Bugs and Features 3577 None None None Never

Description Vincent Danen 2010-05-13 15:45:45 UTC
An unitialized memory read issue exists in the CUPS web interface in how it handles form variables.  An attacker with access to the CUPS web interface could possibly read a limited amount of memory from the cupsd process.  In cgi-bin/var.c, when processing form variables that can come from an unauthenticated user, the cgi_initialize_string() function expects a 2-character hex code after the % character.  If the last character of data is the % character, then it will append a mangled version of the nul terminator and one more byte following the end of data to the output.  The loop will continue appending the contents of memory past the end of data to the output, until another nul byte is read.  A GET request will disclose memory from the environment variable list, and a POST request will disclose memory from the heap.

Upstream CUPS 1.4.4 has corrected this flaw.

Acknowledgements:

Red Hat would like to thank the Apple Product Security team for responsibly reporting this flaw. Upstream acknowledges Luca Carettoni as the original reporter.

Comment 3 Vincent Danen 2010-05-13 16:00:40 UTC
Created attachment 413803 [details]
proposed upstream patch

Comment 6 Vincent Danen 2010-06-15 22:30:52 UTC
This is public now via http://support.apple.com/kb/HT4188

Comment 7 Vincent Danen 2010-06-17 20:34:14 UTC
Created cups tracking bugs for this issue

Affects: fedora-all [bug 605399]

Comment 8 errata-xmlrpc 2010-06-17 22:18:54 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3
  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 5

Via RHSA-2010:0490 https://rhn.redhat.com/errata/RHSA-2010-0490.html

Comment 9 Fedora Update System 2010-06-18 11:03:20 UTC
cups-1.4.4-1.fc13 has been submitted as an update for Fedora 13.
http://admin.fedoraproject.org/updates/cups-1.4.4-1.fc13

Comment 10 Fedora Update System 2010-06-18 11:04:14 UTC
cups-1.4.4-1.fc12 has been submitted as an update for Fedora 12.
http://admin.fedoraproject.org/updates/cups-1.4.4-1.fc12

Comment 11 Fedora Update System 2010-06-18 11:04:56 UTC
cups-1.4.4-1.fc11 has been submitted as an update for Fedora 11.
http://admin.fedoraproject.org/updates/cups-1.4.4-1.fc11

Comment 12 Fedora Update System 2010-06-24 12:22:28 UTC
cups-1.4.4-4.fc13 has been submitted as an update for Fedora 13.
http://admin.fedoraproject.org/updates/cups-1.4.4-4.fc13

Comment 13 Fedora Update System 2010-06-25 18:10:18 UTC
cups-1.4.4-4.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 14 Fedora Update System 2010-07-01 18:44:17 UTC
cups-1.4.4-5.fc13 has been pushed to the Fedora 13 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 15 Fedora Update System 2010-07-27 02:45:37 UTC
cups-1.4.4-5.fc12 has been pushed to the Fedora 12 stable repository.  If problems still persist, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.