Debian: cupsys denial of service

    Date15 Sep 2004
    CategoryDebian
    2957
    Posted ByLinuxSecurity Advisories
    Alvaro Martinez Echevarria discovered a problem in CUPS, the CommonUNIX Printing System. An attacker can easily disable browsing in CUPSby sending a specially crafted UDP datagram to port 631 where cupsd isrunning.
    
    --------------------------------------------------------------------------
    Debian Security Advisory DSA 545-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                             Martin Schulze
    September 15th, 2004                     http://www.debian.org/security/faq
    --------------------------------------------------------------------------
    
    Package        : cupsys
    Vulnerability  : denial of service
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CAN-2004-0558
    
    Alvaro Martinez Echevarria discovered a problem in CUPS, the Common
    UNIX Printing System.  An attacker can easily disable browsing in CUPS
    by sending a specially crafted UDP datagram to port 631 where cupsd is
    running.
    
    For the stable distribution (woody) this problem has been fixed in
    version 1.1.14-5woody6.
    
    For the unstable distribution (sid) this problem has been fixed in
    version cupsys_1.1.20final+rc1-6.
    
    We recommend that you upgrade your cups packages.
    
    
    Upgrade Instructions
    --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody6.dsc
          Size/MD5 checksum:      710 a07b12e56c064cc392408b4cd35297ec
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody6.diff.gz
          Size/MD5 checksum:    37466 a3a4e41f61264d96f454e90ba4b5f1b2
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14.orig.tar.gz
          Size/MD5 checksum:  6150756 0dfa41f29fa73e7744903b2471d2ca2f
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody6_alpha.deb
          Size/MD5 checksum:  1899360 f215d659dec85338570effe22d1ed2d6
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody6_alpha.deb
          Size/MD5 checksum:    74074 0768333965c953b7b4c4e753e5faf1f0
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody6_alpha.deb
          Size/MD5 checksum:    92724 1cfaeb0a068ee8b746354c4c70a17241
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody6_alpha.deb
          Size/MD5 checksum:  2445566 ffd962bb1528991357378aa3687723c0
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody6_alpha.deb
          Size/MD5 checksum:   137730 90376f68cf54ad34612d5684bccf22b3
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody6_alpha.deb
          Size/MD5 checksum:   180676 34a42174524a51bcd4f47f1d7fa8144f
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody6_arm.deb
          Size/MD5 checksum:  1821354 9075d071f37fc9f12c7c2e198bc4d11d
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody6_arm.deb
          Size/MD5 checksum:    68208 3ef56fd8fa630f466135c031a7a92242
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody6_arm.deb
          Size/MD5 checksum:    85392 d7b701513b6625243a959a0fc642f500
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody6_arm.deb
          Size/MD5 checksum:  2345556 0adb9cd8ec0545e78a2b6e22ae6da85f
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody6_arm.deb
          Size/MD5 checksum:   112704 b8015d9c950665b0c7e20473f5a5dded
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody6_arm.deb
          Size/MD5 checksum:   150136 a85d1577cccfa88d18eb3cc9925b158c
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody6_i386.deb
          Size/MD5 checksum:  1788040 ad9376585f934dd43ddd14a0efa24e38
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody6_i386.deb
          Size/MD5 checksum:    67712 f661bca82a2c3041ba8c264902d71da9
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody6_i386.deb
          Size/MD5 checksum:    83866 5650f15f66e3b4b1f7eb28d531be6655
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody6_i386.deb
          Size/MD5 checksum:  2311690 ade7b27e7a5ac5b447ea86d2a0f7da0b
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody6_i386.deb
          Size/MD5 checksum:   110720 26daaa4bda276fc01ad1dec18a9e6246
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody6_i386.deb
          Size/MD5 checksum:   136290 89cdd3c3040084ddca0957cb358e7ee2
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody6_ia64.deb
          Size/MD5 checksum:  2007500 78ffbb37d23cc9a17b6d4f69a4ede6d2
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody6_ia64.deb
          Size/MD5 checksum:    77106 2ec1eb32c757b287e7968fcd29e5f4f1
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody6_ia64.deb
          Size/MD5 checksum:    96862 59534ee68008b087f7898569eecba0d6
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody6_ia64.deb
          Size/MD5 checksum:  2656502 6f4963047d424a11b1a753fa7f964e4e
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody6_ia64.deb
          Size/MD5 checksum:   155700 d014b6fa8a66598ac561ce3976f920a3
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody6_ia64.deb
          Size/MD5 checksum:   182670 bb59c120ec4da8bb805d76787a6649e4
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody6_hppa.deb
          Size/MD5 checksum:  1881226 fb118c844cfdb7f6dd9e8f0112c5aa93
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody6_hppa.deb
          Size/MD5 checksum:    70512 4e989a1423e889292f12d3e224606516
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody6_hppa.deb
          Size/MD5 checksum:    89532 e600d34e6f5899fea345ac3c6c583ff6
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody6_hppa.deb
          Size/MD5 checksum:  2455674 bf2076d60f3ff5275652a0e9c0c39264
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody6_hppa.deb
          Size/MD5 checksum:   126338 a976066dd66a391db93ca10b26175a9d
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody6_hppa.deb
          Size/MD5 checksum:   159268 cbf07f66309b72985528a509a4deab73
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody6_m68k.deb
          Size/MD5 checksum:  1754648 5c2029510c1fa709c47e7ff46d8de814
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody6_m68k.deb
          Size/MD5 checksum:    65992 0cd2e5053aa6a299abe2d7afb6bfc2fb
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody6_m68k.deb
          Size/MD5 checksum:    81098 7c19ade6475957b7b718380f8a58ee73
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody6_m68k.deb
          Size/MD5 checksum:  2261102 3031b40b3d90f1b6a6a80c2b626013c5
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody6_m68k.deb
          Size/MD5 checksum:   105946 79faaf339c0982baaba6848d736ac2fc
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody6_m68k.deb
          Size/MD5 checksum:   128508 304b48deb19c4975a39baf68d4108cfe
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody6_mips.deb
          Size/MD5 checksum:  1811166 63316c5c5216aaa4ff28962b479c374f
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody6_mips.deb
          Size/MD5 checksum:    67630 323139073dce81bf159f41830023ccc6
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody6_mips.deb
          Size/MD5 checksum:    81064 7c4feb7d5d27abe2688903eac8c22a79
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody6_mips.deb
          Size/MD5 checksum:  2404372 0db437ad25beaa39224f5466a704bb49
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody6_mips.deb
          Size/MD5 checksum:   112498 6fd8048438c21e99ebff7eb7ea6af835
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody6_mips.deb
          Size/MD5 checksum:   150964 466cb076e1d06e1032143675171d4986
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody6_mipsel.deb
          Size/MD5 checksum:  1811650 7da825f32fb70cdb41a3f30da4f34e71
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody6_mipsel.deb
          Size/MD5 checksum:    67602 4571b05b1a7b6a1d3a0d8dbedc071c5c
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody6_mipsel.deb
          Size/MD5 checksum:    81084 aba46d5e79fb1feb7808b864d4415a56
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody6_mipsel.deb
          Size/MD5 checksum:  2406732 d7c7674cb01f7dcaae94c30035a2395b
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody6_mipsel.deb
          Size/MD5 checksum:   112284 042425fa79583bd196a39bd18023c578
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody6_mipsel.deb
          Size/MD5 checksum:   150744 91bb5b8993e1a1a7616d44e31ab6f7c8
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody6_powerpc.deb
          Size/MD5 checksum:  1800042 6bbbb0187ffa85235f79102fc57c14bb
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody6_powerpc.deb
          Size/MD5 checksum:    67616 f93ce6c4ff46c8ba0b0a9a23d7d0ae63
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody6_powerpc.deb
          Size/MD5 checksum:    83186 57dce89627c85210935171ae87a342ad
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody6_powerpc.deb
          Size/MD5 checksum:  2359516 cb59819be590ef13a3e2992b2cc45859
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody6_powerpc.deb
          Size/MD5 checksum:   116502 1b65cba959b9d238c12ae97f38617de0
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody6_powerpc.deb
          Size/MD5 checksum:   144954 c993a822fdcfbe1b8f7378c5af76b015
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody6_s390.deb
          Size/MD5 checksum:  1795432 bd0bac0bf25153570378024d0f8d3ba7
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody6_s390.deb
          Size/MD5 checksum:    68996 e8a7d3f58145a295eb0d48940552269f
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody6_s390.deb
          Size/MD5 checksum:    85726 d751455c2423b4ec6725fbdfac2b6204
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody6_s390.deb
          Size/MD5 checksum:  2337350 cd84ea419933e75ecba143cf704c96ca
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody6_s390.deb
          Size/MD5 checksum:   115024 5e88baead30a2b62355049fa62f72ff9
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody6_s390.deb
          Size/MD5 checksum:   140560 ca6c5e78433107fea3a0c78000a1a4eb
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.1.14-5woody6_sparc.deb
          Size/MD5 checksum:  1844846 a537c47a07f07eb40e37b5cb5a93e33c
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.1.14-5woody6_sparc.deb
          Size/MD5 checksum:    70580 04163ae6f92eb9494a6778659f520d8d
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.1.14-5woody6_sparc.deb
          Size/MD5 checksum:    84012 eb292bf575b623e1b98a33e01db6f0d6
         http://security.debian.org/pool/updates/main/c/cupsys/cupsys-pstoraster_1.1.14-5woody6_sparc.deb
          Size/MD5 checksum:  2354384 d103635563e4a36830a91f46340fd14f
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.1.14-5woody6_sparc.deb
          Size/MD5 checksum:   120182 3e52cd974f9e51bc3013b565cf12ef35
         http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.1.14-5woody6_sparc.deb
          Size/MD5 checksum:   146496 8ee6bbaa97c04825178bfe7e7504bc4b
    
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.