Secunia Security Advisory - Mandriva has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
85ec6b32345574c17153cbddf348fb876bf19b7e8bfdde65666e714275d79aae
----------------------------------------------------------------------
A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.
Download and test it today:
https://psi.secunia.com/
Read more about this new version:
https://psi.secunia.com/?page=changelog
----------------------------------------------------------------------
TITLE:
Mandriva update for cups
SECUNIA ADVISORY ID:
SA29132
VERIFY ADVISORY:
http://secunia.com/advisories/29132/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From local network
OPERATING SYSTEM:
Mandriva Linux 2007.0
http://secunia.com/product/12165/
DESCRIPTION:
Mandriva has issued an update for cups. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
The vulnerability is caused due to an error when adding or removing
remote shared printers via IPP. This can be exploited to crash the
CUPS daemon by sending specially crafted IPP packets to a vulnerable
service.
SOLUTION:
Apply updated packages.
Mandriva Linux 2007
0a7d158dea287d3fb02d562e66144f55
2007.0/i586/cups-1.2.4-1.7mdv2007.0.i586.rpm
0f89e8283a7765359bf587aa1a49d537
2007.0/i586/cups-common-1.2.4-1.7mdv2007.0.i586.rpm
80e246d3868f57bc052f9d0527161ed2
2007.0/i586/cups-serial-1.2.4-1.7mdv2007.0.i586.rpm
11e435c39845560d06451300cee0ff78
2007.0/i586/libcups2-1.2.4-1.7mdv2007.0.i586.rpm
82903c633dfe9b705976ac9cfea5fe13
2007.0/i586/libcups2-devel-1.2.4-1.7mdv2007.0.i586.rpm
f688f9d5d9c80a1c4081ba897bda3b31
2007.0/i586/php-cups-1.2.4-1.7mdv2007.0.i586.rpm
9d8074c34c5471dd2ea7150747e9763d
2007.0/SRPMS/cups-1.2.4-1.7mdv2007.0.src.rpm
Mandriva Linux 2007/X86_64
35030a4837fef0355a0353e552d56d45
2007.0/x86_64/cups-1.2.4-1.7mdv2007.0.x86_64.rpm
6f91d3f1c641e623549ad9d102037205
2007.0/x86_64/cups-common-1.2.4-1.7mdv2007.0.x86_64.rpm
5b974bae09a30c051fca184dbfc514a6
2007.0/x86_64/cups-serial-1.2.4-1.7mdv2007.0.x86_64.rpm
d6a2095673a0e3093303bb98c2251fb8
2007.0/x86_64/lib64cups2-1.2.4-1.7mdv2007.0.x86_64.rpm
d705ff9b705c54a3c842c25823c3c412
2007.0/x86_64/lib64cups2-devel-1.2.4-1.7mdv2007.0.x86_64.rpm
64424352ee5b03cc16d6318d47681602
2007.0/x86_64/php-cups-1.2.4-1.7mdv2007.0.x86_64.rpm
9d8074c34c5471dd2ea7150747e9763d
2007.0/SRPMS/cups-1.2.4-1.7mdv2007.0.src.rpm
ORIGINAL ADVISORY:
http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:051
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------