CUPS负长度HTTP头漏洞

漏洞信息详情

CUPS负长度HTTP头漏洞

漏洞简介

Common Unix Printing System (CUPS)1.1.14至1.1.17存在漏洞。远程攻击者可以通过HTTP请求中的(1)负内容长度值或(2)区块传输编码中的负长度导致负参数注入 memcpy()调用中,可能导致服务拒绝(崩溃)并可能执行任意代码。

漏洞公告

Conectiva has released advisory CLA-2003:702 to address this issue. Further information regarding obtaining and applying fixes can be found in the referenced advisory.
It is recommended that all Gentoo Linux users who are running
net-print/cups-1.1.17_pre20021025 or earlier update their systems as
follows:
emerge rsync
emerge cups
emerge clean
Debian has released a security advisory (DSA 232-1) containing fixes. Users are advised to upgrade as soon as possible.
** Debian has released an updated advisory (DSA 232-2) containing links to corrected fixes containing the proper dependencies for libPNG.
This vulnerability is eliminated in CUPS 1.1.18. Red Hat is currently developing fixes. Apple MacOS X 10.2.3 and MacOS X Server 10.2.3 are not vulnerable.
Easy Software Products CUPS 1.0.4 -8

Easy Software Products CUPS 1.0.4

Easy Software Products CUPS 1.1.1

Easy Software Products CUPS 1.1.10

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享