CVE-2003-0788
CVSS5.0
发布时间 :2003-12-01 00:00:00
修订时间 :2008-09-05 16:35:15
NMCOS    

[原文]Unknown vulnerability in the Internet Printing Protocol (IPP) implementation in CUPS before 1.1.19 allows remote attackers to cause a denial of service (CPU consumption from a "busy loop") via certain inputs to the IPP port (TCP 631).


[CNNVD]Cups Internet Printing Protocol作业循环拒绝服务攻击漏洞(CNNVD-200312-015)

        
        Common Unix Printing System (CUPS)是一款通用Unix打印系统,是Unix环境下的跨平台打印解决方案,基于Internet打印协议,提供大多数PostScript和raster打印机服务。
        CUPS存在一个安全漏洞,本地攻击者可以利用这个漏洞提交特殊作业请求而进行拒绝服务。
        要利用这个漏洞,攻击者必须连接IPP监听端口(631)进行攻击。目前没有详细漏洞细节提供。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:easy_software_products:cups:1.1.6
cpe:/a:easy_software_products:cups:1.0.4_8
cpe:/a:easy_software_products:cups:1.1.12
cpe:/a:easy_software_products:cups:1.1.4_5
cpe:/a:easy_software_products:cups:1.1.14
cpe:/a:easy_software_products:cups:1.1.18
cpe:/a:easy_software_products:cups:1.1.7
cpe:/a:easy_software_products:cups:1.1.13
cpe:/a:easy_software_products:cups:1.1.4_3
cpe:/a:easy_software_products:cups:1.1.4_2
cpe:/a:easy_software_products:cups:1.1.15
cpe:/a:easy_software_products:cups:1.1.16
cpe:/a:easy_software_products:cups:1.1.17
cpe:/a:easy_software_products:cups:1.1.4
cpe:/a:easy_software_products:cups:1.1.10
cpe:/a:easy_software_products:cups:1.1.1
cpe:/a:easy_software_products:cups:1.0.4

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0788
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0788
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200312-015
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/8952
(VENDOR_ADVISORY)  BID  8952
http://www.redhat.com/support/errata/RHSA-2003-275.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2003:275
http://xforce.iss.net/xforce/xfdb/13584
(UNKNOWN)  XF  cups-ipp-dos(13584)
http://www.turbolinux.com/security/TLSA-2003-63.txt
(UNKNOWN)  TURBO  TLSA-2003-63
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:104
(UNKNOWN)  MANDRAKE  MDKSA-2003:104
http://secunia.com/advisories/10123
(UNKNOWN)  SECUNIA  10123
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=97958
(UNKNOWN)  MISC  http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=97958
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000788
(UNKNOWN)  CONECTIVA  CLA-2003:788
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000779
(UNKNOWN)  CONECTIVA  CLA-2003:779

- 漏洞信息

Cups Internet Printing Protocol作业循环拒绝服务攻击漏洞
中危 输入验证
2003-12-01 00:00:00 2005-10-20 00:00:00
远程  
        
        Common Unix Printing System (CUPS)是一款通用Unix打印系统,是Unix环境下的跨平台打印解决方案,基于Internet打印协议,提供大多数PostScript和raster打印机服务。
        CUPS存在一个安全漏洞,本地攻击者可以利用这个漏洞提交特殊作业请求而进行拒绝服务。
        要利用这个漏洞,攻击者必须连接IPP监听端口(631)进行攻击。目前没有详细漏洞细节提供。
        

- 公告与补丁

        厂商补丁:
        RedHat
        ------
        RedHat已经为此发布了一个安全公告(RHSA-2003:275-01)以及相应补丁:
        RHSA-2003:275-01:Updated CUPS packages fix denial of service
        链接:https://www.redhat.com/support/errata/RHSA-2003-275.html
        补丁下载:
        Red Hat Linux 8.0:
        SRPMS:
        ftp://updates.redhat.com/8.0/en/os/SRPMS/cups-1.1.17-0.9.src.rpm
        i386:
        ftp://updates.redhat.com/8.0/en/os/i386/cups-1.1.17-0.9.i386.rpm
        ftp://updates.redhat.com/8.0/en/os/i386/cups-devel-1.1.17-0.9.i386.rpm
        ftp://updates.redhat.com/8.0/en/os/i386/cups-libs-1.1.17-0.9.i386.rpm
        Red Hat Linux 9:
        SRPMS:
        ftp://updates.redhat.com/9/en/os/SRPMS/cups-1.1.17-13.3.0.3.src.rpm
        i386:
        ftp://updates.redhat.com/9/en/os/i386/cups-1.1.17-13.3.0.3.i386.rpm
        ftp://updates.redhat.com/9/en/os/i386/cups-devel-1.1.17-13.3.0.3.i386.rpm
        ftp://updates.redhat.com/9/en/os/i386/cups-libs-1.1.17-13.3.0.3.i386.rpm
        可使用下列命令安装补丁:
        rpm -Fvh [文件名]

- 漏洞信息

2761
CUPS Unspecified DoS
Denial of Service
Loss of Availability

- 漏洞描述

CUPS V1.1.19 contains a flaw that may allow a local denial of service. The issue is triggered when a malicious user connects to TCP port 631 (IPP) and cause IPP to enter into an infinite loop.

- 时间线

2003-11-03 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 1.2 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): Restrict access to ensure that only trusted users can access the service.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Cups Internet Printing Protocol Job Loop Denial Of Service Vulnerability
Input Validation Error 8952
Yes No
2003-11-03 12:00:00 2009-07-12 12:56:00
Discovery credited to Paul Mitcheson.

- 受影响的程序版本

Turbolinux Turbolinux Workstation 8.0
Turbolinux Turbolinux Server 8.0
Easy Software Products CUPS 1.1.18
+ Conectiva Linux 9.0
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ MandrakeSoft Multi Network Firewall 2.0
+ Mandriva Linux Mandrake 9.0
+ S.u.S.E. Linux Personal 8.2
Easy Software Products CUPS 1.1.17
+ Red Hat Enterprise Linux AS 3
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
Easy Software Products CUPS 1.1.16
+ Mandriva Linux Mandrake 9.0
Easy Software Products CUPS 1.1.15
+ Conectiva Linux Enterprise Edition 1.0
+ S.u.S.E. Linux 8.1
Easy Software Products CUPS 1.1.14
+ Conectiva Linux 8.0
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
Easy Software Products CUPS 1.1.13
Easy Software Products CUPS 1.1.12
+ S.u.S.E. Linux 8.0 i386
+ S.u.S.E. Linux 8.0
Easy Software Products CUPS 1.1.10
+ Caldera OpenLinux Server 3.1.1
+ Caldera OpenLinux Workstation 3.1.1
+ Conectiva Linux 7.0
+ Conectiva Linux 6.0
+ Mandriva Linux Mandrake 8.1 ia64
+ Mandriva Linux Mandrake 8.1
+ S.u.S.E. Linux 7.3 sparc
+ S.u.S.E. Linux 7.3 ppc
+ S.u.S.E. Linux 7.3 i386
Easy Software Products CUPS 1.1.7
Easy Software Products CUPS 1.1.6
+ Caldera OpenLinux Server 3.1
+ Caldera OpenLinux Workstation 3.1
+ Mandriva Linux Mandrake 8.0 ppc
+ Mandriva Linux Mandrake 8.0
+ S.u.S.E. Linux 7.2 i386
+ S.u.S.E. Linux 7.1 x86
+ S.u.S.E. Linux 7.1 sparc
+ S.u.S.E. Linux 7.1 ppc
+ S.u.S.E. Linux 7.1 alpha
Easy Software Products CUPS 1.1.4 -5
Easy Software Products CUPS 1.1.4 -3
+ Mandriva Linux Mandrake 7.2
Easy Software Products CUPS 1.1.4 -2
+ Debian Linux 2.3
Easy Software Products CUPS 1.1.4
+ Debian Linux 2.3
+ Mandriva Linux Mandrake 7.2
Easy Software Products CUPS 1.1.1
+ RedHat PowerTools 7.0
Easy Software Products CUPS 1.0.4 -8
+ Debian Linux 2.2
Easy Software Products CUPS 1.0.4
+ Debian Linux 2.2
Apple Mac OS X Server 10.3.3
Apple Mac OS X Server 10.3.2
Apple Mac OS X Server 10.3.1
Apple Mac OS X Server 10.3
Apple Mac OS X Server 10.2.8
Apple Mac OS X 10.3.3
Apple Mac OS X 10.3.2
Apple Mac OS X 10.3.1
Apple Mac OS X 10.3
Apple Mac OS X 10.2.8
Easy Software Products CUPS 1.1.19
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Turbolinux Appliance Server 1.0 Workgroup Edition
+ Turbolinux Appliance Server 1.0 Hosting Edition
+ Turbolinux Appliance Server Hosting Edition 1.0
+ Turbolinux Appliance Server Workgroup Edition 1.0
+ Turbolinux Home
+ Turbolinux Turbolinux Desktop 10.0
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Workstation 8.0

- 不受影响的程序版本

Easy Software Products CUPS 1.1.19
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Turbolinux Appliance Server 1.0 Workgroup Edition
+ Turbolinux Appliance Server 1.0 Hosting Edition
+ Turbolinux Appliance Server Hosting Edition 1.0
+ Turbolinux Appliance Server Workgroup Edition 1.0
+ Turbolinux Home
+ Turbolinux Turbolinux Desktop 10.0
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Workstation 8.0

- 漏洞讨论

A problem has been identified in the handling of requests via CUPS Internet Printing Protocol (IPP). Because of this, it is possible for an attacker to deny service to legitimate users.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

Turbolinux have released an advisory (TLSA-2003-63) to address this issue. Users who are potentially affected by this vulnerability are advised to apply relative fixes as soon as possible. Further information regarding obtaining and applying these fixes can be found in the referenced advisory.

Red Hat has made advisory RHSA-2003:275-01 and fixes available. See referenced advisory for additional details.

Mandrake has released an advisory (MDKSA-2003:104) that includes updates to address this issue. Please see the attached advisory for details on obtaining and applying fixes.

Conectiva has released advisory CLA-2003:779 with fixes to address this issue. See referenced advisory for additional details. Conectiva has also released an advisory for Conectiva Linux Enterprise Edition.

SCO has released advisory CSSA-2004-012.0 to address this issue.


Easy Software Products CUPS 1.1.10

Easy Software Products CUPS 1.1.14

Easy Software Products CUPS 1.1.15

Easy Software Products CUPS 1.1.18

Apple Mac OS X 10.2.8

Apple Mac OS X Server 10.2.8

Apple Mac OS X Server 10.3

Apple Mac OS X 10.3

Apple Mac OS X Server 10.3.1

Apple Mac OS X 10.3.1

Apple Mac OS X 10.3.2

Apple Mac OS X Server 10.3.2

Apple Mac OS X Server 10.3.3

Apple Mac OS X 10.3.3

Turbolinux Turbolinux Workstation 8.0

Turbolinux Turbolinux Server 8.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站