CVE-2004-0558
CVSS5.0
发布时间 :2004-09-28 00:00:00
修订时间 :2016-10-17 22:46:07
NMCOEPS    

[原文]The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows remote attackers to cause a denial of service (service hang) via a certain UDP packet to the IPP port.


[CNNVD]CUPS UDP数据包远程服务拒绝漏洞(CNNVD-200409-082)

        CUPS 1.1.21之前版本中的Internet Printing Protocol(IPP)的安装启用存在漏洞。远程攻击者可以借助某个IPP端口的UDP数据包导致服务拒绝(服务挂起)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:11732The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows remote attackers to cause a denial of service (service hang...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0558
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0558
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200409-082
(官方数据源) CNNVD

- 其它链接及资源

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000872
(UNKNOWN)  CONECTIVA  CLA-2004:872
http://lists.apple.com/archives/security-announce/2004/Oct/msg00000.html
(UNKNOWN)  APPLE  APPLE-SA-2004-09-30
http://marc.info/?l=bugtraq&m=109760654431316&w=2
(UNKNOWN)  SCO  SCOSA-2004.15
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57646-1
(UNKNOWN)  SUNALERT  57646
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201005-1
(UNKNOWN)  SUNALERT  201005
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1000757.1-1
(UNKNOWN)  SUNALERT  1000757
http://www.debian.org/security/2004/dsa-545
(VENDOR_ADVISORY)  DEBIAN  DSA-545
http://www.redhat.com/support/errata/RHSA-2004-449.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2004:449
http://www.securityfocus.com/bid/11183
(UNKNOWN)  BID  11183
http://www.suse.com/de/security/2004_31_cups.html
(UNKNOWN)  SUSE  SUSE-SA:2004:031
http://www.trustix.org/errata/2004/0047/
(VENDOR_ADVISORY)  TRUSTIX  2004-0047
http://xforce.iss.net/xforce/xfdb/17389
(PATCH)  XF  cups-udp-dos(17389)
https://bugzilla.fedora.us/show_bug.cgi?id=2072
(PATCH)  FEDORA  FLSA:2072

- 漏洞信息

CUPS UDP数据包远程服务拒绝漏洞
中危 其他
2004-09-28 00:00:00 2010-02-24 00:00:00
远程  
        CUPS 1.1.21之前版本中的Internet Printing Protocol(IPP)的安装启用存在漏洞。远程攻击者可以借助某个IPP端口的UDP数据包导致服务拒绝(服务挂起)。

- 公告与补丁

        SuSE has released advisory SUSE-SA:2004:031 to address this issue. Please see the attached advisory for information on obtaining and applying fixes.
        ALT Linux have released an update to address this issue.
        Red Hat has released advisory RHSA-2004:449-17 and fixes to address this issue on Red Hat Linux Enterprise platforms. Customers who are affected by this issue are advised to apply the appropriate updates. Customers subscribed to the Red Hat Network may apply the appropriate fixes using the Red Hat Update Agent (up2date). Please see referenced advisory for additional information.
        Debian has released advisory DSA 545-1 to address this issue. Please see the attached advisory for further information on obtaining and applying fixes.
        Mandrake has released advisory MDKSA-2004:097 to address this issue. Please see the attached advisory for further information on obtaining and applying fixes.
        CUPS 1.1.21 has been released to address this issue. A vendor patch for version 1.2.20 is also available.
        Trustix Secure Linux has released an advisory (TSLSA-2004-0047) along with fixes dealing with this, and other issues. Please see the referenced advisory for further information.
        Gentoo has released an advisory (GLSA 200409-25) and fixes for this issue. To obtain fixes, run the following commands:
        emerge sync
        emerge -pv ">=net-print/cups-1.1.20-r2"
        emerge ">=net-print/cups-1.1.20-r2"
        Slackware Linux has released an advisory (SSA:2004-266-01) along with fixes dealing with this issue.
        RedHat has released an advisory (FEDORA-2004-275) to address this issue in Fedora Core 2. Please see the referenced advisory for more information.
        Apple has released updates for this issue that may be applied through Software Update. Manual updates are also available. Please see the Apple advisory (APPLE-SA-2004-09-30) for more information.
        Sun Microsystems has made a security alert (Sun Alert ID: 57646) along with a fix dealing with this issue. Sun advises that all users download and install the update. To download and install the updated RPMs from the update servers select the following from the launch bar:
        Launch >> Applications >> System Tools >> Online Update
        For more information please see the referenced Sun advisory.
        SCO has released advisory SCOSA-2004.15 along with fixes to address this issue in SCO Unixware 7.1.3up and 7.1.4. Please see the referenced advisory for further information.
        Conectiva has released advisory CLA-2004:872 to address this issue. Please see the attached advisory for details on obtaining and applying fixes.
        Fedora Legacy has released advisory FLSA-2004:2072 along with fixes for RedHat Linux dealing with this issue. Please see the referenced advisory for more information.
        Turbolinux has released advisory TLSA-2004-33 along with fixes dealing with this issue. Please see the referenced advisory for more information.
        SCO has released advisory SCOSA-2005.51, along with fixes to address this issue in SCO OpenServer 5.0.7 and 6.0.0. Please see the referenced advisory for further information.
        Sun Java Desktop System (JDS) 2003
        

  •         Sun patch-9321
            

  •         

        Easy Software Products CUPS 1.1.14
        

- 漏洞信息 (24599)

CUPS 1.1.x UDP Packet Remote Denial Of Service Vulnerability (EDBID:24599)
linux dos
2004-09-15 Verified
0 Alvaro Martinez Echevarria
N/A [点击下载]
source: http://www.securityfocus.com/bid/11183/info

CUPS is prone to a remotely exploitable denial of service vulnerability that may be triggered through port 631 by a zero-length UDP packet.

nmap -sU -p 631 example.com		

- 漏洞信息 (F34672)

Fedora Legacy Update Advisory 2072 (PacketStormID:F34672)
2004-10-16 00:00:00
The Fedora Legacy project  cups.org
advisory,denial of service
linux,fedora
CVE-2004-0558
[点击下载]

Fedora Legacy Update Advisory - FLSA:2072. Updated CUPS packages fix security vulnerability. Updated cups packages that fix a denial of service vulnerability are now available. In versions of CUPS prior to 1.1.21, an attacker can craft packets to the IPP port which will result in a Denial of Service on the CUPS service.

-----------------------------------------------------------------------
               Fedora Legacy Update Advisory

Synopsis:          Updated CUPS packages fix security vulnerability
Advisory ID:       FLSA:2072
Issue date:        2004-10-16
Product:           Red Hat Linux, Fedora Core
Keywords:          Bugfix
Cross references:  https://bugzilla.fedora.us/show_bug.cgi?id=3D2072
CVE Names:         CAN-2004-0558
-----------------------------------------------------------------------


-----------------------------------------------------------------------
1. Topic:

Updated cups packages that fix a denial of service vulnerability are now
available.

The Common UNIX Printing System (CUPS) is a print spooler.

2. Relevant releases/architectures:

Red Hat Linux 9 - i386
Fedora Core 1 - i386

3. Problem description:

Alvaro Martinez Echevarria reported a bug in the CUPS Internet Printing
Protocol (IPP) implementation in versions of CUPS prior to 1.1.21. An
attacker could send a carefully crafted UDP packet to the IPP port which
could cause CUPS to stop listening to the port and result in a denial of
service. In order to exploit this bug, an attacker would need to have
the ability to send a UDP packet to the IPP port (by default 631). The
Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2004-0558 to this issue.

All users of cups should upgrade to these updated packages, which
contain a backported patch as well as a fix for a non-exploitable
off-by-one bug.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which
are not installed but included in the list will not be updated.  Note
that you can also use wildcards (*.rpm) if your current directory *only*
contains the desired RPMs.

Please note that this update is also available via yum and apt.  Many
people find this an easier way to apply updates.  To use yum issue:

yum update

or to use apt:

apt-get update; apt-get upgrade

This will start an interactive process that will result in the
appropriate RPMs being upgraded on your system.  This assumes that you
have yum or apt-get configured for obtaining Fedora Legacy content.
Please visit http://www fedoralegacy.org/docs for directions on how to
configure yum and apt-get.

5. Bug IDs fixed:

http://bugzilla.fedora.us - 2072 - CAN-2004-0558 - CUPS denial of
service

6. RPMs required:

Red Hat Linux 9:

SRPM:
http://download.fedoralegacy.org/redhat/9/updates/SRPMS/cups-1.1.17-13.3.0.=
6.legacy.src.rpm

i386:
http://download.fedoralegacy.org/redhat/9/updates/i386/cups-1.1.17-13.3.0.6=
.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/cups-devel-1.1.17-13=
.3.0.6.legacy.i386.rpm
http://download.fedoralegacy.org/redhat/9/updates/i386/cups-libs-1.1.17-13.=
3.0.6.legacy.i386.rpm

Fedora Core 1:

SRPM:
http://download.fedoralegacy.org/fedora/1/updates/SRPMS/cups-1.1.19-13.2.le=
gacy.src.rpm

i386:
http://download.fedoralegacy.org/fedora/1/updates/i386/cups-1.1.19-13.2.leg=
acy.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/cups-devel-1.1.19-13=
.2.legacy.i386.rpm
http://download.fedoralegacy.org/fedora/1/updates/i386/cups-libs-1.1.19-13.=
2.legacy.i386.rpm

7. Verification:

SHA1 sum                                 Package Name
---------------------------------------------------------------------------

dc9e67863c6ed358eca94f36f04c2549be49bee7=20
redhat/9/updates/i386/cups-1.1.17-13.3.0.6.legacy.i386.rpm
fc7fd1c2c7ad79e2c419b5440e6b0e0a88b2e276=20
redhat/9/updates/i386/cups-devel-1.1.17-13.3.0.6.legacy.i386.rpm
39f6b741f82f6e566351d15f7ec384f0cde9a17e=20
redhat/9/updates/i386/cups-libs-1.1.17-13.3.0.6.legacy.i386.rpm
ff063b1392b2841153d5dc234c5f3ed6d54d63e4=20
redhat/9/updates/SRPMS/cups-1.1.17-13.3.0.6.legacy.src.rpm
e7684dfcd7142714848be20e318e5c58aed2b481=20
fedora/1/updates/i386/cups-1.1.19-13.2.legacy.i386.rpm
8dbb4ea34d20de5b70e1672e60794fcfe5021f4b=20
fedora/1/updates/i386/cups-devel-1.1.19-13.2.legacy.i386.rpm
369439d5c253a361ffd64f892efc448c62d54e94=20
fedora/1/updates/i386/cups-libs-1.1.19-13.2.legacy.i386.rpm
8b69b1f1c661a5c75dfadcfb85a19fd712e5f904=20
fedora/1/updates/SRPMS/cups-1.1.19-13.2.legacy.src.rpm

These packages are GPG signed by Fedora Legacy for security.  Our key is
available from http://www.fedoralegacy org/about/security.php

You can verify each package with the following command:

    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the sha1sum with the following command:

    sha1sum <filename>

8. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2004-0558
http://www.cups.org/str.php?L863

9. Contact:

The Fedora Legacy security contact is <secnotice@fedoralegacy.org>. More
project details at http://www.fedoralegacy.org

---------------------------------------------------------------------


--=-WY26hRKc+QaP4ot+2xF9
Content-Type: application/pgp-signature; name=signature.asc
Content-Description: This is a digitally signed message part

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQBBcWH2LMAs/0C4zNoRAokRAJ9AaTk5qFZDsasCb87nnRNVSfay1gCeOfMn
CO8T8xzq7qwJX/r6PRMUDe0=
=HBaH
-----END PGP SIGNATURE-----

--=-WY26hRKc+QaP4ot+2xF9--


    

- 漏洞信息 (F34377)

SUSE Security Announcement 2004.31 (PacketStormID:F34377)
2004-09-17 00:00:00
Novell,Alvaro Martinez,SUSE  suse.com
advisory,remote,denial of service,arbitrary
linux,suse
CVE-2004-0801,CVE-2004-0558
[点击下载]

SUSE Security Announcement - Alvaro Martinez Echevarria has found a remote Denial of Service condition within CUPS which allows remote users to make the cups server unresponsive. Additionally the SUSE Security Team has discovered a flaw in the foomatic-rip print filter which is commonly installed along with cups. It allows remote attackers, which are listed in the printing ACLs, to execute arbitrary commands as the printing user 'lp'.

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-type" content="text/html;charset=utf-8" />
<title>SUSE Security Announcement 2004.31 ≈ Packet Storm</title>
<meta name="description" content="Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers" />
<meta name="keywords" content="security,exploit,advisory,whitepaper,xss,csrf,overflow,scanner,vulnerability" />
<link rel="shortcut icon" href="/img/pss.ico" />
<link rel="stylesheet" media="screen,print,handheld" href="http://packetstatic.com/css1366870159/pss.css" type="text/css" />
<!--[if lt ie 8]><link rel="stylesheet" type="text/css" href="http://packetstatic.com/css1366870159/ie.css" /><![endif]-->
<script type="text/javascript" src="http://packetstatic.com/js1366870155/pt.js"></script>
<script type="text/javascript" src="http://packetstatic.com/js1366870155/pss.js"></script>
<link rel="search" type="application/opensearchdescription+xml" href="http://packetstormsecurity.com/opensearch.xml" title="Packet Storm Site Search" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Headlines" href="http://rss.packetstormsecurity.com/news/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Recent Files" href="http://rss.packetstormsecurity.com/files/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Exploits" href="http://rss.packetstormsecurity.com/files/tags/exploit/" />
<link rel="alternate" type="application/rss+xml" title="Packet Storm Advisories" href="http://rss.packetstormsecurity.com/files/tags/advisory/" />
</head>
<body id="files">
<div id="t">
   <div id="tc">
      <a id="top" href="/"><img src="http://packetstatic.com/img1353978071/ps_logo.png" width="315" height="65" id="logo" alt="packet storm" /></a>
      <div id="slogan">seeing is believing
</div>
      <div id="account"><a href="https://packetstormsecurity.com/account/register/">Register</a> | <a href="https://packetstormsecurity.com/account/login/">Login</a></div>
      <div id="search">
        <form method="get" action="/search/"><input type="text" name="q" id="q" maxlength="120" value="Search …" /><button type="submit"></button><div id="q-tabs"><label for="s-files" class="on">Files</label><label for="s-news">News</label><label for="s-users">Users</label><label for="s-authors">Authors</label><input type="radio" value="files" name="s" id="s-files" /><input type="radio" value="news" name="s" id="s-news" /><input type="radio" value="users" name="s" id="s-users" /><input type="radio" value="authors" name="s" id="s-authors" /></div></form>
      </div>
   </div>
    <div id="tn"><div id="tnc">
        <a href="/" id="tn-home"><span>Home</span></a> <a href="/files/" id="tn-files"><span>Files</span></a> <a href="/news/" id="tn-news"><span>News</span></a> <a href="/about/" id="tn-about"><span>About</span></a> <a href="/contact/" id="tn-contact"><span>Contact</span></a> <a href="/submit/" id="tn-submit"><span>Add New</span></a>
    </div></div>
    <div id="tn2"></div>
</div>

<div id="c">

 <div id="cc">
     <div id="m">
    

    
    
    
     
    <div class="h1"><h1>SUSE Security Announcement 2004.31</h1></div>
<dl id="F34377" class="file first">
<dt><a class="ico text-plain" href="/files/download/34377/SUSE-SA%3A2004%3A031.txt" title="Size: 20.4 KB"><strong>SUSE Security Announcement 2004.31</strong></a></dt>
<dd class="datetime">Posted <a href="/files/date/2004-09-17/" title="05:48:09 UTC">Sep 17, 2004</a></dd>
<dd class="refer">Authored by <a href="/files/author/3499/" class="company">Novell</a>, <a href="/files/author/3582/" class="person">Alvaro Martinez</a>, <a href="/files/author/3583/" class="person">SUSE</a> | Site <a href="http://www.suse.com/">suse.com</a></dd>
<dd class="detail"><p>SUSE Security Announcement - Alvaro Martinez Echevarria has found a remote Denial of Service condition within CUPS which allows remote users to make the cups server unresponsive. Additionally the SUSE Security Team has discovered a flaw in the foomatic-rip print filter which is commonly installed along with cups. It allows remote attackers, which are listed in the printing ACLs, to execute arbitrary commands as the printing user 'lp'.</p></dd>
<dd class="tags"><span>tags</span> | <a href="/files/tags/advisory">advisory</a>, <a href="/files/tags/remote">remote</a>, <a href="/files/tags/denial_of_service">denial of service</a>, <a href="/files/tags/arbitrary">arbitrary</a></dd>
<dd class="os"><span>systems</span> | <a href="/files/os/linux">linux</a>, <a href="/files/os/suse">suse</a></dd>
<dd class="cve"><span>advisories</span> | <a href="/files/cve/CVE-2004-0801">CVE-2004-0801</a>, <a href="/files/cve/CVE-2004-0558">CVE-2004-0558</a></dd>
<dd class="md5"><span>MD5</span> | <code>bcdd3c34b76481d7c6e5dfb74adfe134</code></dd>
<dd class="act-links"><a href="/files/download/34377/SUSE-SA%3A2004%3A031.txt" title="Size: 20.4 KB" rel="nofollow">Download</a> | <a href="/files/favorite/34377/" class="fav" rel="nofollow">Favorite</a> | <a href="/files/34377/SUSE-Security-Announcement-2004.31.html">Comments <span>(0)</span></a></dd>
</dl>
<div id="extra-links"><a href="/files/related/34377/SUSE-Security-Announcement-2004.31.html" id="related">Related Files</a><div id="share">
<h2>Share This</h2>
<ul>
<li><iframe scrolling="no" frameborder="0" allowtransparency="true" style="border: medium none; overflow: hidden; width: 80px; height: 21px;" src="http://www.facebook.com/plugins/like.php?href=http://packetstormsecurity.com/files/34377/SUSE-Security-Announcement-2004.31.html&layout=button_count&show_faces=true&width=250&action=like&font&colorscheme=light&height=21"></iframe></li><li><iframe scrolling="no" frameborder="0" tabindex="0" allowtransparency="true" src="http://platform0.twitter.com/widgets/tweet_button.html?_=1286138321418&count=horizontal&lang=en&text=SUSE%20Security%20Announcement%202004.31&url=http://packetstormsecurity.com/files/34377/SUSE-Security-Announcement-2004.31.html&via=packet_storm" style="width: 110px; height: 20px;" title="Twitter"></iframe></li><li><a href="http://www.linkedin.com/shareArticle?mini=true&url=http://packetstormsecurity.com/files/34377/SUSE-Security-Announcement-2004.31.html&title=SUSE%20Security%20Announcement%202004.31&source=Packet+Storm" class="LinkedIn">LinkedIn</a></li><li><a href="http://www.reddit.com/submit?url=http://packetstormsecurity.com/files/34377/SUSE-Security-Announcement-2004.31.html&title=SUSE%20Security%20Announcement%202004.31" class="Reddit">Reddit</a></li><li><a href="http://digg.com/submit?phase=2&url=http://packetstormsecurity.com/files/34377/SUSE-Security-Announcement-2004.31.html" class="Digg">Digg</a></li><li><a href="http://www.stumbleupon.com/submit?url=http://packetstormsecurity.com/files/34377/SUSE-Security-Announcement-2004.31.html&title=SUSE%20Security%20Announcement%202004.31" class="StumbleUpon">StumbleUpon</a></li></ul>
</div>
</div>
<div class="h1"><h1>SUSE Security Announcement 2004.31</h1></div>
<div class="src">
<div><a href="/mirrors/">Change Mirror</a> <a href="/files/download/34377/SUSE-SA%3A2004%3A031.txt">Download</a></div>
<pre><code>-----BEGIN PGP SIGNED MESSAGE-----<br /><br />______________________________________________________________________________<br /><br />                        SUSE Security Announcement<br /><br />        Package:                cups<br />        Announcement-ID:        SUSE-SA:2004:031<br />        Date:                   Wednesday, Sep 15th, 15:30:00 MEST 2004<br />        Affected products:      8.1, 8.2, 9.0, 9.1<br />                                SUSE Linux Enterprise Server 8, 9<br />                                SUSE Linux Desktop 1.0<br />        Vulnerability Type:     remote code execution<br />        Severity (1-10):        6<br />        SUSE default package:   Yes.<br />        Cross References:       CAN-2004-0801<br />                                CAN-2004-0558<br /><br />    Content of this advisory:<br />        1) security vulnerability resolved:<br />             - remote command execution and remote DoS in CUPS<br />           problem description<br />        2) solution/workaround<br />        3) special instructions and notes<br />        4) package location and checksums<br />        5) pending vulnerabilities, solutions, workarounds:<br />            - squid<br />            - OpenOffice<br />            - mozilla<br />            - mpg123<br />            - ImageMagick<br />        6) standard appendix (further information)<br /><br />______________________________________________________________________________<br /><br />1) problem description, brief discussion<br /><br />   The Common Unix Printing System (CUPS) enables local and remote users to<br />   obtain printing functionallity via the Internet Printing Protocol (IPP).<br />     Alvaro Martinez Echevarria has found a remote Denial of Service condition<br />   within CUPS which allows remote users to make the cups server unresponsive.<br />     Additionally the SUSE Security Team has discovered a flaw in the<br />   foomatic-rip print filter which is commonly installed along with cups.<br />   It allows remote attackers, which are listed in the printing ACLs, to<br />   execute arbitrary commands as the printing user 'lp'.<br /><br /><br />2) solution/workaround<br /><br />   If you use CUPS, we recommend an update in any case. Additionally the IPP<br />   port (TCP port 631) should be firewalled and the printing ACLs should<br />   be set up in a way to reflect the local security policy.<br /><br /><br />3) special instructions and notes<br /><br />   After successfully updating the cups package, you need to run the following<br />   command as root:<br /><br />     rccups restart<br /><br /><br />4) package location and checksums<br /><br />    Please download the update package for your distribution and verify its<br />    integrity by the methods listed in section 3) of this announcement.<br />    Then, install the package using the command "rpm -Fhv file.rpm" to apply<br />    the update.<br />    Our maintenance customers are being notified individually. The packages<br />    are being offered to install from the maintenance web.<br /><br /><br />    x86 Platform:<br /><br />    SUSE Linux 9.1:<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/cups-1.1.20-108.8.i586.rpm<br />      976655f117091c2bbc78399ffedf6c9c<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/cups-libs-1.1.20-108.8.i586.rpm<br />      f4af26bd260fc756e2070c340105295d<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/cups-client-1.1.20-108.8.i586.rpm<br />      90cf964bf8b3ea5567754b15c0ab6988<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/foomatic-filters-3.0.1-41.6.i586.rpm<br />      b67b7187ecb708d7ec2980f7cdcdaa81<br />    patch rpm(s):<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/cups-1.1.20-108.8.i586.patch.rpm<br />      ce0f75db69c838557ecda3e3300bb763<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/cups-libs-1.1.20-108.8.i586.patch.rpm<br />      213cbdc01c0f39895f75eb6816641b82<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/cups-client-1.1.20-108.8.i586.patch.rpm<br />      9c47790dcd6fa339ea7a8d21ad841e54<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/i586/foomatic-filters-3.0.1-41.6.i586.patch.rpm<br />      8ccae3fb4988acf0c829ffe491472716<br />    source rpm(s):<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/cups-1.1.20-108.8.src.rpm<br />      96a63ac94b63f0d54d16bd2d3ea73a24<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.1/rpm/src/foomatic-filters-3.0.1-41.6.src.rpm<br />      18816a89350fe3fa234506d40e4812b1<br /><br />    SUSE Linux 9.0:<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/cups-1.1.19-93.i586.rpm<br />      f72e1b1c033695ef9f3fe9a64ace220b<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/cups-libs-1.1.19-93.i586.rpm<br />      46f540ce3bcf72a870eeb2ef78d1e7ec<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/cups-client-1.1.19-93.i586.rpm<br />      9c9d4eb93c3dbf2ad740f6041224ff90<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/foomatic-filters-3.0.0-100.i586.rpm<br />      4f5c750a1f756161407e4186b378ac51<br />    patch rpm(s):<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/cups-1.1.19-93.i586.patch.rpm<br />      91b88efa969bb367ead02dfa686f5711<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/cups-libs-1.1.19-93.i586.patch.rpm<br />      9952d1df78213228f1a0fc129c60331a<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/cups-client-1.1.19-93.i586.patch.rpm<br />      e83d2d6a85445fdaf186e4eba91a68da<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/i586/foomatic-filters-3.0.0-100.i586.patch.rpm<br />      3d91bc3f72cfb8efa4c1a38bf6a46d60<br />    source rpm(s):<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/src/cups-1.1.19-93.src.rpm<br />      236dd9aab66ee87ef73cfe9c7a4dd3a4<br />    ftp://ftp.suse.com/pub/suse/i386/update/9.0/rpm/src/foomatic-filters-3.0.0-100.src.rpm<br />      56b6200d339a0bd727b102b65d327493<br /><br />    SUSE Linux 8.2:<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/cups-1.1.18-96.i586.rpm<br />      5092cfbf2d9f71b53cfa571d23ac8e26<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/cups-libs-1.1.18-96.i586.rpm<br />      1b52320ac8e50797b9e140ba0339008c<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/cups-client-1.1.18-96.i586.rpm<br />      b0cc87346a3b2270081123bbb5fd932a<br />    patch rpm(s):<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/cups-1.1.18-96.i586.patch.rpm<br />      d67014a864afaa86952ed752d89a251a<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/cups-libs-1.1.18-96.i586.patch.rpm<br />      be6ae574c2f26a7f07d1b5e16f4ede02<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/cups-client-1.1.18-96.i586.patch.rpm<br />      c176435d584a763ae5b57dcde996f82c<br />    source rpm(s):<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/cups-1.1.18-96.src.rpm<br />      870f0825115fdf9526beb6e1ec867381<br /><br />    SUSE Linux 8.1:<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/cups-1.1.15-170.i586.rpm<br />      b8a1daf19c2fa58fecc3f9dafb8c4c8d<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/cups-libs-1.1.15-170.i586.rpm<br />      9f7a2dbc92804cb54749e72426d79a62<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/cups-client-1.1.15-170.i586.rpm<br />      7a82aedac6586fa27109e3576f5c4c27<br />    patch rpm(s):<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/cups-1.1.15-170.i586.patch.rpm<br />      341ebcf57e793a836b5475353cb21e7c<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/cups-libs-1.1.15-170.i586.patch.rpm<br />      3b75cf2265150044560555785e8e4c82<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/cups-client-1.1.15-170.i586.patch.rpm<br />      926eca878ee8c36c4efa509d7b7243d4<br />    source rpm(s):<br />    ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/cups-1.1.15-170.src.rpm<br />      ffc7b24d6638f04933621b9b49bb9e9e<br /><br /><br /><br />    x86-64 Platform:<br /><br />    SUSE Linux 9.1:<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/cups-1.1.20-108.8.x86_64.rpm<br />      fc7b3c21d0bdd1b5617263045a0f0058<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/cups-libs-1.1.20-108.8.x86_64.rpm<br />      4490d72429d54417049a4daabc763e56<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/cups-client-1.1.20-108.8.x86_64.rpm<br />      23e430a166baef8840b067f71b7ae96d<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/foomatic-filters-3.0.1-41.6.x86_64.rpm<br />      cfc0d3052c29da4e9b9bccac8cb0211e<br />    patch rpm(s):<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/cups-1.1.20-108.8.x86_64.patch.rpm<br />      4f347e2efa5151cee929889b18ddfed4<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/cups-libs-1.1.20-108.8.x86_64.patch.rpm<br />      5157c96ec037e965c39ee0139c6287cf<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/cups-client-1.1.20-108.8.x86_64.patch.rpm<br />      ef1f955450463ee0a751ae1a4f5ceacc<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/x86_64/foomatic-filters-3.0.1-41.6.x86_64.patch.rpm<br />      4f34ffee4f359ca09eaf481c2904796e<br />    source rpm(s):<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/cups-1.1.20-108.8.src.rpm<br />      00ecd612999696c7f3a4e531c1a2198e<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.1/rpm/src/foomatic-filters-3.0.1-41.6.src.rpm<br />      33e32a64142f72a224691d64c50f9f66<br /><br />    SUSE Linux 9.0:<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/cups-1.1.19-93.x86_64.rpm<br />      1b68c217134d058a5036f9a0058ddd0d<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/cups-libs-1.1.19-93.x86_64.rpm<br />      1d48cc152e891fb3baeb2d2409830878<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/cups-client-1.1.19-93.x86_64.rpm<br />      a313c4956f44e230c0df9909ba0a7d25<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/foomatic-filters-3.0.0-100.x86_64.rpm<br />      9b4d8b411702153be4a73222e6a12553<br />    patch rpm(s):<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/cups-1.1.19-93.x86_64.patch.rpm<br />      f7bda7125579c9bda8cfd9f4e0f6f4a0<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/cups-libs-1.1.19-93.x86_64.patch.rpm<br />      608d96f3f6566a65e70a57fcc367f777<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/cups-client-1.1.19-93.x86_64.patch.rpm<br />      a7d38ee463699f6152f8e42ee1da745d<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/x86_64/foomatic-filters-3.0.0-100.x86_64.patch.rpm<br />      c83d5f8d7d41083bdad779505b777d11<br />    source rpm(s):<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/cups-1.1.19-93.src.rpm<br />      c05016dadf2756e7e66c32c2c2b25858<br />    ftp://ftp.suse.com/pub/suse/x86_64/update/9.0/rpm/src/foomatic-filters-3.0.0-100.src.rpm<br />      aa0436134b6b46418455e1c5235c36c0<br /><br />______________________________________________________________________________<br /><br />5)  Pending vulnerabilities in SUSE Distributions and Workarounds:<br /><br />    - squid<br />    The NTLM authentication in squid suffers from a DoS vulnerability.<br />    New packages are currently being tested and will soon be available<br />    on our ftp servers.<br /><br />    - OpenOffice<br />    OpenOffice sets the permissions of tmp-files according to the umask,<br />    which might be unsuitable. This will be fixed in upcoming distributions.<br />    If you work in an untrusted environment, you may set the $TEMP, $TMP and<br />    $TMPDIR environment variables to a location within your $HOME as a<br />    workaround.<br /><br />    - mozilla<br />    We are in the process of releasing updates for mozilla (and related<br />    browsers), fixing various issues: CAN-2004-0597, CAN-2004-0718,<br />    CAN-2004-0722, CAN-2004-0757, CAN-2004-0758, CAN-2004-0759, CAN-2004-0760,<br />    CAN-2004-0761, CAN-2004-0762, CAN-2004-0763, CAN-2004-0764 and<br />    CAN-2004-0765.<br />    We will give you concrete details in a separate mozilla advisory when the<br />    updates are available.<br /><br />    - mpg123<br />    A buffer overflow in the decoding of data streams has been fixed. New<br />    packages are available on our ftp servers. CAN-2004-0805 has been<br />    assigned to this issue.<br /><br />    - ImageMagick<br />    A buffer overflow in the code handling BMP images has been fixed.<br />    New packages are available on our ftp servers. CAN-2004-0827 has been<br />    assigned to this issue.<br /><br />______________________________________________________________________________<br /><br />6)  standard appendix: authenticity verification, additional information<br /><br />  - Package authenticity verification:<br /><br />    SUSE update packages are available on many mirror ftp servers all over<br />    the world. While this service is being considered valuable and important<br />    to the free and open source software community, many users wish to be<br />    sure about the origin of the package and its content before installing<br />    the package. There are two verification methods that can be used<br />    independently from each other to prove the authenticity of a downloaded<br />    file or rpm package:<br />    1) md5sums as provided in the (cryptographically signed) announcement.<br />    2) using the internal gpg signatures of the rpm package.<br /><br />    1) execute the command<br />        md5sum <name-of-the-file.rpm><br />       after you downloaded the file from a SUSE ftp server or its mirrors.<br />       Then, compare the resulting md5sum with the one that is listed in the<br />       announcement. Since the announcement containing the checksums is<br />       cryptographically signed (usually using the key security@suse.de),<br />       the checksums show proof of the authenticity of the package.<br />       We disrecommend to subscribe to security lists which cause the<br />       email message containing the announcement to be modified so that<br />       the signature does not match after transport through the mailing<br />       list software.<br />       Downsides: You must be able to verify the authenticity of the<br />       announcement in the first place. If RPM packages are being rebuilt<br />       and a new version of a package is published on the ftp server, all<br />       md5 sums for the files are useless.<br /><br />    2) rpm package signatures provide an easy way to verify the authenticity<br />       of an rpm package. Use the command<br />        rpm -v --checksig <file.rpm><br />       to verify the signature of the package, where <file.rpm> is the<br />       filename of the rpm package that you have downloaded. Of course,<br />       package authenticity verification can only target an un-installed rpm<br />       package file.<br />       Prerequisites:<br />        a) gpg is installed<br />        b) The package is signed using a certain key. The public part of this<br />           key must be installed by the gpg program in the directory<br />           ~/.gnupg/ under the user's home directory who performs the<br />           signature verification (usually root). You can import the key<br />           that is used by SUSE in rpm packages for SUSE Linux by saving<br />           this announcement to a file ("announcement.txt") and<br />           running the command (do "su -" to be root):<br />            gpg --batch; gpg < announcement.txt | gpg --import<br />           SUSE Linux distributions version 7.1 and thereafter install the<br />           key "build@suse.de" upon installation or upgrade, provided that<br />           the package gpg is installed. The file containing the public key<br />           is placed at the top-level directory of the first CD (pubring.gpg)<br />           and at ftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de .<br /><br /><br />  - SUSE runs two security mailing lists to which any interested party may<br />    subscribe:<br /><br />    suse-security@suse.com<br />        -   general/linux/SUSE security discussion.<br />            All SUSE security announcements are sent to this list.<br />            To subscribe, send an email to<br />                <suse-security-subscribe@suse.com>.<br /><br />    suse-security-announce@suse.com<br />        -   SUSE's announce-only mailing list.<br />            Only SUSE's security announcements are sent to this list.<br />            To subscribe, send an email to<br />                <suse-security-announce-subscribe@suse.com>.<br /><br />    For general information or the frequently asked questions (faq) <br />    send mail to:<br />        <suse-security-info@suse.com> or<br />        <suse-security-faq@suse.com> respectively.<br /><br />    =====================================================================<br />    SUSE's security contact is <security@suse.com> or <security@suse.de>.<br />    The <security@suse.de> public key is listed below.<br />    =====================================================================<br />______________________________________________________________________________<br /><br />    The information in this advisory may be distributed or reproduced,<br />    provided that the advisory is not modified in any way. In particular,<br />    it is desired that the clear-text signature shows proof of the<br />    authenticity of the text.<br />    SUSE Linux AG makes no warranties of any kind whatsoever with respect<br />    to the information contained in this security advisory.<br /><br />Type Bits/KeyID    Date       User ID<br />pub  2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de><br />pub  1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de><br /><br />- -----BEGIN PGP PUBLIC KEY BLOCK-----<br />Version: GnuPG v1.0.6 (GNU/Linux)<br />Comment: For info see http://www.gnupg.org<br /><br />mQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCkYS3yEKeueNWc+z/0Kvff<br />4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP+Y0PFPboMvKx0FXl/A0d<br />M+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR8xocQSVCFxcwvwCglVcO<br />QliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U8c/yE/vdvpN6lF0tmFrK<br />XBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0ScZqITuZC4CWxJa9GynBE<br />D3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEhELBeGaPdNCcmfZ66rKUd<br />G5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtBUVKn4zLUOf6aeBAoV6NM<br />CC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOoAqajLfvkURHAeSsxXIoE<br />myW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1nKFvF+rQoU3VTRSBQYWNr<br />YWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohcBBMRAgAcBQI57vSBBQkD<br />wmcABAsKAwQDFQMCAxYCAQIXgAAKCRCoTtronIAKyl8sAJ98BgD40zw0GHJHIf6d<br />NfnwI2PAsgCgjH1+PnYEl7TFjtZsqhezX7vZvYCIRgQQEQIABgUCOnBeUgAKCRCe<br />QOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lxyoAejACeOO1HIbActAevk5MUBhNe<br />LZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWnB/9An5vfiUUE1VQnt+T/EYklES3t<br />XXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDVwM2OgSEISZxbzdXGnqIlcT08TzBU<br />D9i579uifklLsnr35SJDZ6ram51/CWOnnaVhUzneOA9gTPSr+/fT3WeVnwJiQCQ3<br />0kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF5Yryk23pQUPAgJENDEqeU6iIO9Ot<br />1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3D3EN8C1yPqZd5CvvznYvB6bWBIpW<br />cRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGuzgpJt9IXSzyohEJB6XG5+D0BiF0E<br />ExECAB0FAjxqqTQFCQoAgrMFCwcKAwQDFQMCAxYCAQIXgAAKCRCoTtronIAKyp1f<br />AJ9dR7saz2KPNwD3U+fy/0BDKXrYGACfbJ8fQcJqCBQxeHvt9yMPDVq0B0W5Ag0E<br />Oe70khAIAISR0E3ozF/la+oNaRwxHLrCet30NgnxRROYhPaJB/Tu1FQokn2/Qld/<br />HZnh3TwhBIw1FqrhWBJ7491iAjLR9uPbdWJrn+A7t8kSkPaF3Z/6kyc5a8fas44h<br />t5h+6HMBzoFCMAq2aBHQRFRNp9Mz1ZvoXXcI1lk1l8OqcUM/ovXbDfPcXsUVeTPT<br />tGzcAi2jVl9hl3iwJKkyv/RLmcusdsi8YunbvWGFAF5GaagYQo7YlF6UaBQnYJTM<br />523AMgpPQtsKm9o/w9WdgXkgWhgkhZEeqUS3m5xNey1nLu9iMvq9M/iXnGz4sg6Q<br />2Y+GqZ+yAvNWjRRou3zSE7Bzg28MI4sAAwYH/2D71Xc5HPDgu87WnBFgmp8MpSr8<br />QnSs0wwPg3xEullGEocolSb2c0ctuSyeVnCttJMzkukL9TqyF4s/6XRstWirSWaw<br />JxRLKH6Zjo/FaKsshYKf8gBkAaddvpl3pO0gmUYbqmpQ3xDEYlhCeieXS5MkockQ<br />1sj2xYdB1xO0ExzfiCiscUKjUFy+mdzUsUutafuZ+gbHog1CN/ccZCkxcBa5IFCH<br />ORrNjq9pYWlrxsEn6ApsG7JJbM2besW1PkdEoxak74z1senh36m5jQvVjA3U4xq1<br />wwylxadmmJaJHzeiLfb7G1ZRjZTsB7fyYxqDzMVul6o9BSwO/1XsIAnV1uuITAQY<br />EQIADAUCOe70kgUJA8JnAAAKCRCoTtronIAKyksiAJsFB3/77SkH3JlYOGrEe1Ol<br />0JdGwACeKTttgeVPFB+iGJdiwQlxasOfuXyITAQYEQIADAUCPGqpWQUJCgCCxwAK<br />CRCoTtronIAKyofBAKCSZM2UFyta/fe9WgITK9I5hbxxtQCfX+0ar2CZmSknn3co<br />SPihn1+OBNyZAQ0DNuEtBAAAAQgAoCRcd7SVZEFcumffyEwfLTcXQjhKzOahzxpo<br />omuF+HIyU4AGq+SU8sTZ/1SsjhdzzrSAfv1lETACA+3SmLr5KV40Us1w0UC64cwt<br />A46xowVq1vMlH2Lib+V/qr3b1hE67nMHjysECVx9Ob4gFuKNoR2eqnAaJvjnAT8J<br />/LoUC20EdCHUqn6v+M9t/WZgC+WNR8cq69uDy3YQhDP/nIan6fm2uf2kSV9A7ZxE<br />GrwsWl/WX5Q/sQqMWaU6r4az98X3z90/cN+eJJ3vwtA+rm+nxEvyev+jaLuOQBDf<br />ebh/XA4FZ35xmi+spdiVeJH4F/ubaGlmj7+wDOF3suYAPSXT2QAFEbQlU3VTRSBT<br />ZWN1cml0eSBUZWFtIDxzZWN1cml0eUBzdXNlLmRlPokBFQMFEDbhLUfkWLKHsco8<br />RQEBVw4H/1vIdiOLX/7hdzYaG9crQVIk3QwaB5eBbjvLEMvuCZHiY2COUg5QdmPQ<br />8SlWNZ6k4nu1BLcv2g/pymPUWP9fG4tuSnlUJDrWGm3nhyhAC9iudP2u1YQY37Gb<br />B6NPVaZiYMnEb4QYFcqv5c/r2ghSXUTYk7etd6SW6WCOpEqizhx1cqDKNZnsI/1X<br />11pFcO2N7rc6byDBJ1T+cK+F1Ehan9XBt/shryJmv04nli5CXQMEbiqYYMOu8iaA<br />8AWRgXPCWqhyGhcVD3LRhUJXjUOdH4ZiHCXaoF3zVPxpeGKEQY8iBrDeDyB3wHmj<br />qY9WCX6cmogGQRgYG6yJqDalLqrDOdmJARUDBRA24S0Ed7LmAD0l09kBAW04B/4p<br />WH3f1vQn3i6/+SmDjGzUu2GWGq6Fsdwo2hVM2ym6CILeow/K9JfhdwGvY8LRxWRL<br />hn09j2IJ9P7H1Yz3qDf10AX6V7YILHtchKT1dcngCkTLmDgC4rs1iAAl3f089sRG<br />BafGPGKv2DQjHfR1LfRtbf0P7c09Tkej1MP8HtQMW9hPkBYeXcwbCjdrVGFOzqx+<br />AvvJDdT6a+oyRMTFlvmZ83UV5pgoyimgjhWnM1V4bFBYjPrtWMkdXJSUXbR6Q7Pi<br />RZWCzGRzwbaxqpl3rK/YTCphOLwEMB27B4/fcqtBzgoMOiaZA0M5fFoo54KgRIh0<br />zinsSx2OrWgvSiLEXXYKiEYEEBECAAYFAjseYcMACgkQnkDjEAAKq6ROVACgjhDM<br />/3KM+iFjs5QXsnd4oFPOnbkAnjYGa1J3em+bmV2aiCdYXdOuGn4ZiQCVAwUQN7c7<br />whaQN/7O/JIVAQEB+QP/cYblSAmPXxSFiaHWB+MiUNw8B6ozBLK0QcMQ2YcL6+Vl<br />D+nSZP20+Ja2nfiKjnibCv5ss83yXoHkYk2Rsa8foz6Y7tHwuPiccvqnIC/c9Cvz<br />dbIsdxpfsi0qWPfvX/jLMpXqqnPjdIZErgxpwujas1n9016PuXA8K3MJwVjCqSKI<br />RgQQEQIABgUCOhpCpAAKCRDHUqoysN/3gCt7AJ9adNQMbmA1iSYcbhtgvx9ByLPI<br />DgCfZ5Wj+f7cnYpFZI6GkAyyczG09sE=<br />=LRKC<br />- -----END PGP PUBLIC KEY BLOCK-----<br /><br />-----BEGIN PGP SIGNATURE-----<br />Version: GnuPG v1.2.2-rc1-SuSE (GNU/Linux)<br /><br />iQEVAwUBQUhF9ney5gA9JdPZAQGH7gf/epYSwaWsZXV80JNzDitZ4xSxm8RFWCXh<br />iTLA+YQ6cBPbhPDLIUYA9zI/iGIjQeSYfU5olPqhbd8DjUDL/i7jJlbyZeAVAHuO<br />i57O6YIgKbhvrP/zbW2PGbO73e91Mfl1nyy+BapNp/xHLcBue/gVi6zG+vgQAxUp<br />f0bg9jA7TZrm28Lmb6ImkgGqmQbgmyEwRSe/HTN8r0vFqppT5AjZsIm1EtXliQlx<br />LIEqWK2jBpfWME2j+TjS14t95uuS+FIR1upEAewjOBVcYgV60nbyoUR7O+WtwSof<br />/lTNwvGh6mcY2u99tdxeuYe3m/lvcwrCtKiTrXnVsyko+Fa9/gBOCg==<br />=wF7S<br />-----END PGP SIGNATURE-----<br /></code></pre>
</div>
<div id="comments">
<h2>Comments</h2><a href="http://rss.packetstormsecurity.com/files/34377" class="rss-cmt"><img src="http://packetstatic.com/img1353978071/bt_rss.gif" width="16" height="16" alt="RSS Feed" /> <span>Subscribe to this comment feed</span></a><br /><p id="comment-none">No comments yet, be the first!</p></div>
<div id="comment-form" style="display:none"></div><div id="comment-login"><a href="https://packetstormsecurity.com/account/login/">Login</a> or <a href="https://packetstormsecurity.com/account/register/">Register</a> to post a comment</div>
    
    
     </div>
    
      <div id="adblock">
        
      </div>
      <div id="mn">
        <div class="mn-like-us">
<ul>
<li><a href="https://twitter.com/packet_storm"><img src="http://packetstatic.com/img1353978071/s_twitter.png" width="24" height="24" alt="Follow on Twitter" /> Follow us on Twitter</a></li>
<li><a href="https://www.facebook.com/packetstormfeed"><img src="http://packetstatic.com/img1353978071/s_facebook.png" width="24" height="24" alt="Follow on Facebook" /> Follow us on Facebook</a></li>
<li><a href="/feeds"><img src="http://packetstatic.com/img1353978071/s_rss.png" width="24" height="24" alt="View RSS Feeds" /> Subscribe to an RSS Feed</a></li>
</ul>
</div>
<div class="mn-like-us"><ul><li style="border-color: #afa; background: #efe"><a style="border-color: #6f6; background: #afa; color: #060; padding-left: 0;" href="/bugbounty/"><span style="color:#393">$ $ $</span>  Write Exploits? Get Paid!</a></li></ul></div>
<div>
<form id="cal" action="/files/cal/" method="post">
<h2>File Archive:</h2><h3>April 2013</h3>
<button id="cal-prev" name="cal-prev" type="button" value="2013-4"><span><</span></button><ul class="dotw"><li>Su</li><li>Mo</li><li>Tu</li><li>We</li><li>Th</li><li>Fr</li><li>Sa</li></ul>
<ul><li></li><li class="low"><a href="/files/date/2013-04-01/">1</a><div class="stats"><div class="point"></div><div class="date">Apr 1st</div><div class="count">10 Files</div></div></li><li class="med"><a href="/files/date/2013-04-02/">2</a><div class="stats"><div class="point"></div><div class="date">Apr 2nd</div><div class="count">15 Files</div></div></li><li class="med"><a href="/files/date/2013-04-03/">3</a><div class="stats"><div class="point"></div><div class="date">Apr 3rd</div><div class="count">16 Files</div></div></li><li class="med"><a href="/files/date/2013-04-04/">4</a><div class="stats"><div class="point"></div><div class="date">Apr 4th</div><div class="count">15 Files</div></div></li><li class="med"><a href="/files/date/2013-04-05/">5</a><div class="stats"><div class="point"></div><div class="date">Apr 5th</div><div class="count">30 Files</div></div></li><li class="low"><a href="/files/date/2013-04-06/">6</a><div class="stats"><div class="point"></div><div class="date">Apr 6th</div><div class="count">4 Files</div></div></li></ul>
<ul><li class="low"><a href="/files/date/2013-04-07/">7</a><div class="stats"><div class="point"></div><div class="date">Apr 7th</div><div class="count">12 Files</div></div></li><li class="med"><a href="/files/date/2013-04-08/">8</a><div class="stats"><div class="point"></div><div class="date">Apr 8th</div><div class="count">23 Files</div></div></li><li class="med"><a href="/files/date/2013-04-09/">9</a><div class="stats"><div class="point"></div><div class="date">Apr 9th</div><div class="count">26 Files</div></div></li><li class="med"><a href="/files/date/2013-04-10/">10</a><div class="stats"><div class="point"></div><div class="date">Apr 10th</div><div class="count">30 Files</div></div></li><li class="high"><a href="/files/date/2013-04-11/">11</a><div class="stats"><div class="point"></div><div class="date">Apr 11th</div><div class="count">63 Files</div></div></li><li class="low"><a href="/files/date/2013-04-12/">12</a><div class="stats"><div class="point"></div><div class="date">Apr 12th</div><div class="count">12 Files</div></div></li><li class="low"><a href="/files/date/2013-04-13/">13</a><div class="stats"><div class="point"></div><div class="date">Apr 13th</div><div class="count">3 Files</div></div></li></ul>
<ul><li class="low"><a href="/files/date/2013-04-14/">14</a><div class="stats"><div class="point"></div><div class="date">Apr 14th</div><div class="count">2 Files</div></div></li><li class="low"><a href="/files/date/2013-04-15/">15</a><div class="stats"><div class="point"></div><div class="date">Apr 15th</div><div class="count">11 Files</div></div></li><li class="med"><a href="/files/date/2013-04-16/">16</a><div class="stats"><div class="point"></div><div class="date">Apr 16th</div><div class="count">16 Files</div></div></li><li class="med"><a href="/files/date/2013-04-17/">17</a><div class="stats"><div class="point"></div><div class="date">Apr 17th</div><div class="count">15 Files</div></div></li><li class="med"><a href="/files/date/2013-04-18/">18</a><div class="stats"><div class="point"></div><div class="date">Apr 18th</div><div class="count">15 Files</div></div></li><li class="med"><a href="/files/date/2013-04-19/">19</a><div class="stats"><div class="point"></div><div class="date">Apr 19th</div><div class="count">19 Files</div></div></li><li class="low"><a href="/files/date/2013-04-20/">20</a><div class="stats"><div class="point"></div><div class="date">Apr 20th</div><div class="count">3 Files</div></div></li></ul>
<ul><li class="low"><a href="/files/date/2013-04-21/">21</a><div class="stats"><div class="point"></div><div class="date">Apr 21st</div><div class="count">3 Files</div></div></li><li class="low"><a href="/files/date/2013-04-22/">22</a><div class="stats"><div class="point"></div><div class="date">Apr 22nd</div><div class="count">12 Files</div></div></li><li class="low"><a href="/files/date/2013-04-23/">23</a><div class="stats"><div class="point"></div><div class="date">Apr 23rd</div><div class="count">13 Files</div></div></li><li class="low"><a href="/files/date/2013-04-24/">24</a><div class="stats"><div class="point"></div><div class="date">Apr 24th</div><div class="count">11 Files</div></div></li><li class="none today"><a href="/files/date/2013-04-25/">25</a><div class="stats"><div class="point"></div><div class="date">Apr 25th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2013-04-26/">26</a><div class="stats"><div class="point"></div><div class="date">Apr 26th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2013-04-27/">27</a><div class="stats"><div class="point"></div><div class="date">Apr 27th</div><div class="count">0 Files</div></div></li></ul>
<ul><li class="none"><a href="/files/date/2013-04-28/">28</a><div class="stats"><div class="point"></div><div class="date">Apr 28th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2013-04-29/">29</a><div class="stats"><div class="point"></div><div class="date">Apr 29th</div><div class="count">0 Files</div></div></li><li class="none"><a href="/files/date/2013-04-30/">30</a><div class="stats"><div class="point"></div><div class="date">Apr 30th</div><div class="count">0 Files</div></div></li><li></li><li></li><li></li><li></li></ul>
</form></div>
<div id="mn-top-author" class="top-ten">
<h2>Top Authors In Last 30 Days</h2>
<ul>
<li><a href="/files/authors/3786">Mandriva</a> <span>126 files</span></li>
<li><a href="/files/authors/4676">Red Hat</a> <span>44 files</span></li>
<li><a href="/files/authors/3695">Ubuntu</a> <span>28 files</span></li>
<li><a href="/files/authors/2985">Cisco Systems</a> <span>17 files</span></li>
<li><a href="/files/authors/2821">Debian</a> <span>11 files</span></li>
<li><a href="/files/authors/4612">HP</a> <span>11 files</span></li>
<li><a href="/files/authors/8993">juan vazquez</a> <span>9 files</span></li>
<li><a href="/files/authors/8123">Michael Messner</a> <span>7 files</span></li>
<li><a href="/files/authors/8035">High-Tech Bridge SA</a> <span>7 files</span></li>
<li><a href="/files/authors/8982">Slackware Security Team</a> <span>7 files</span></li>
</ul>
</div>
<div id="mn-tag-file"><h2>File Tags</h2><ul><li><a href="/files/tags/activex/">ActiveX</a> <span>(873)</span></li><li><a href="/files/tags/advisory/">Advisory</a> <span>(55,748)</span></li><li><a href="/files/tags/arbitrary/">Arbitrary</a> <span>(8,747)</span></li><li><a href="/files/tags/bbs/">BBS</a> <span>(2,859)</span></li><li><a href="/files/tags/bypass/">Bypass</a> <span>(575)</span></li><li><a href="/files/tags/cgi/">CGI</a> <span>(847)</span></li><li><a href="/files/tags/code_execution/">Code Execution</a> <span>(3,370)</span></li><li><a href="/files/tags/cracker/">Cracker</a> <span>(685)</span></li><li><a href="/files/tags/csrf/">CSRF</a> <span>(1,857)</span></li><li><a href="/files/tags/denial_of_service/">DoS</a> <span>(14,917)</span></li><li><a href="/files/tags/encryption/">Encryption</a> <span>(2,115)</span></li><li><a href="/files/tags/exploit/">Exploit</a> <span>(29,367)</span></li><li><a href="/files/tags/file_inclusion/">File Inclusion</a> <span>(3,386)</span></li><li><a href="/files/tags/firewall/">Firewall</a> <span>(748)</span></li><li><a href="/files/tags/info_disclosure/">Info Disclosure</a> <span>(1,212)</span></li><li><a href="/files/tags/intrusion_detection/">Intrusion Detection</a> <span>(663)</span></li><li><a href="/files/tags/java/">Java</a> <span>(1,320)</span></li><li><a href="/files/tags/javascript/">JavaScript</a> <span>(503)</span></li><li><a href="/files/tags/kernel/">Kernel</a> <span>(2,825)</span></li><li><a href="/files/tags/local/">Local</a> <span>(10,570)</span></li><li><a href="/files/tags/magazine/">Magazine</a> <span>(503)</span></li><li><a href="/files/tags/overflow/">Overflow</a> <span>(8,311)</span></li><li><a href="/files/tags/perl/">Perl</a> <span>(1,213)</span></li><li><a href="/files/tags/php/">PHP</a> <span>(3,984)</span></li><li><a href="/files/tags/proof_of_concept/">Proof of Concept</a> <span>(1,589)</span></li><li><a href="/files/tags/protocol/">Protocol</a> <span>(1,839)</span></li><li><a href="/files/tags/python/">Python</a> <span>(705)</span></li><li><a href="/files/tags/remote/">Remote</a> <span>(19,367)</span></li><li><a href="/files/tags/root/">Root</a> <span>(2,443)</span></li><li><a href="/files/tags/scanner/">Scanner</a> <span>(1,317)</span></li><li><a href="/files/tags/tool/">Security Tool</a> <span>(5,638)</span></li><li><a href="/files/tags/shell/">Shell</a> <span>(1,943)</span></li><li><a href="/files/tags/shellcode/">Shellcode</a> <span>(772)</span></li><li><a href="/files/tags/sniffer/">Sniffer</a> <span>(781)</span></li><li><a href="/files/tags/spoof/">Spoof</a> <span>(1,653)</span></li><li><a href="/files/tags/sql_injection/">SQL Injection</a> <span>(12,575)</span></li><li><a href="/files/tags/tcp/">TCP</a> <span>(1,961)</span></li><li><a href="/files/tags/trojan/">Trojan</a> <span>(541)</span></li><li><a href="/files/tags/udp/">UDP</a> <span>(713)</span></li><li><a href="/files/tags/virus/">Virus</a> <span>(573)</span></li><li><a href="/files/tags/vulnerability/">Vulnerability</a> <span>(22,058)</span></li><li><a href="/files/tags/web/">Web</a> <span>(5,497)</span></li><li><a href="/files/tags/paper/">Whitepaper</a> <span>(2,850)</span></li><li><a href="/files/tags/x86/">x86</a> <span>(585)</span></li><li><a href="/files/tags/xss/">XSS</a> <span>(12,267)</span></li><li><a href="/files/tags/">Other</a></li></ul></div><div id="mn-arch-file"><h2>File Archives</h2><ul><li><a href="/files/date/2013-04/">April 2013</a></li><li><a href="/files/date/2013-03/">March 2013</a></li><li><a href="/files/date/2013-02/">February 2013</a></li><li><a href="/files/date/2013-01/">January 2013</a></li><li><a href="/files/date/2012-12/">December 2012</a></li><li><a href="/files/date/2012-11/">November 2012</a></li><li><a href="/files/date/2012-10/">October 2012</a></li><li><a href="/files/date/2012-09/">September 2012</a></li><li><a href="/files/date/2012-08/">August 2012</a></li><li><a href="/files/date/2012-07/">July 2012</a></li><li><a href="/files/date/2012-06/">June 2012</a></li><li><a href="/files/date/2012-05/">May 2012</a></li><li><a href="/files/date/">Older</a></li></ul></div><div id="mn-os-file"><h2>Systems</h2><ul><li><a href="/files/os/aix/">AIX</a> <span>(371)</span></li><li><a href="/files/os/apple/">Apple</a> <span>(1,067)</span></li><li><a href="/files/os/bsd/">BSD</a> <span>(305)</span></li><li><a href="/files/os/cisco/">Cisco</a> <span>(1,393)</span></li><li><a href="/files/os/debian/">Debian</a> <span>(4,133)</span></li><li><a href="/files/os/fedora/">Fedora</a> <span>(1,663)</span></li><li><a href="/files/os/freebsd/">FreeBSD</a> <span>(1,053)</span></li><li><a href="/files/os/gentoo/">Gentoo</a> <span>(2,646)</span></li><li><a href="/files/os/hpux/">HPUX</a> <span>(735)</span></li><li><a href="/files/os/iphone/">iPhone</a> <span>(99)</span></li><li><a href="/files/os/irix/">IRIX</a> <span>(218)</span></li><li><a href="/files/os/juniper/">Juniper</a> <span>(63)</span></li><li><a href="/files/os/linux/">Linux</a> <span>(23,246)</span></li><li><a href="/files/os/osx/">Mac OS X</a> <span>(453)</span></li><li><a href="/files/os/mandriva/">Mandriva</a> <span>(2,472)</span></li><li><a href="/files/os/netbsd/">NetBSD</a> <span>(244)</span></li><li><a href="/files/os/openbsd/">OpenBSD</a> <span>(422)</span></li><li><a href="/files/os/redhat/">RedHat</a> <span>(3,170)</span></li><li><a href="/files/os/slackware/">Slackware</a> <span>(447)</span></li><li><a href="/files/os/solaris/">Solaris</a> <span>(1,524)</span></li><li><a href="/files/os/suse/">SUSE</a> <span>(1,440)</span></li><li><a href="/files/os/ubuntu/">Ubuntu</a> <span>(3,312)</span></li><li><a href="/files/os/unix/">UNIX</a> <span>(7,126)</span></li><li><a href="/files/os/unixware/">UnixWare</a> <span>(152)</span></li><li><a href="/files/os/windows/">Windows</a> <span>(4,233)</span></li><li><a href="/files/os/">Other</a></li></ul></div>
      </div>

  </div>

</div>

<div id="f">
  <div id="fc">

    <div class="f-box" style="margin: 50px 0 0 0;">
        <a href="/"><img src="http://packetstatic.com/img1353978071/ps_logo.png" width="218" alt="packet storm" /></a>
    <p class="copy">© 2013 Packet Storm. All rights reserved.</p>
    </div>

    <div class="f-box">
    <dl>
      <dt>Site Links</dt>
      <dd><a href="/news/date/">News by Month</a></dd>
      <dd><a href="/news/tags/">News Tags</a></dd>
      <dd><a href="/files/date/">Files by Month</a></dd>
      <dd><a href="/files/tags/">File Tags</a></dd>
      <dd><a href="/files/directory/">File Directory</a></dd>
    </dl>    
    </div>

    <div class="f-box">
    <dl>
      <dt>About Us</dt>
      <dd><a href="/about/">History & Purpose</a></dd>
      <dd><a href="/contact/">Contact Information</a></dd>
      <dd><a href="/legal/tos.html">Terms of Service</a></dd>
      <dd><a href="/legal/privacy.html">Privacy Statement</a></dd>
      <dd><a href="/legal/copyright.html">Copyright Information</a></dd>
    </dl>
    </div>

    <div class="f-box">
	<dl>
      <dt>Services</dt>
      <dd><a href="/services/">Security Services</a></dd>
      <dt style="margin-top:1.5em;">Hosting By</dt>
      <dd><a href="http://www.rokabear.com/">Rokabear</a></dd>
      <dd><a href="/mirrors/">Global Mirror List</a></dd>
    </dl>   
    </div>
    <div class="f-box">
    <ul class="f-follow">
     <li><a href="https://twitter.com/packet_storm"><img width="24" height="24" alt="Follow on Twitter" src="http://packetstatic.com/img1353978071/s_twitter.png" /> Follow us on Twitter</a></li>
     <li><a href="https://www.facebook.com/packetstormfeed"><img width="24" height="24" alt="Follow on Facebook" src="http://packetstatic.com/img1353978071/s_facebook.png" /> Follow us on Facebook</a></li>
     <li><a href="/feeds"><img width="24" height="24" alt="View RSS Feeds" src="http://packetstatic.com/img1353978071/s_rss.png" /> Subscribe to an RSS Feed</a></li>
    </ul>
    </div>

  </div>
</div>

<div id="o-box"><img src="http://packetstatic.com/img1353978071/o_close.png" alt="close" height="30" width="30" id="o-close" /><div id="o-main"></div></div>


<script type="text/javascript"> var _gaq = _gaq || []; _gaq.push(['_setAccount', 'UA-18885198-1']); _gaq.push(['_setDomainName', '.packetstormsecurity.com']); _gaq.push(['_trackPageview']); (function() {var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; ga.src = ('https:' == document.location.protocol ? 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(ga, s);})(); </script><noscript><img src="http://www.google-analytics.com/__utm.gif?utmwv=1.3&utmn=1329779352&utmcs=ISO-8859-1&utmsr=31337x31337&utmsc=32-bit&utmul=en-us&utmje=0&utmfl=-&utmcn=1&utmdt=SUSE%20Security%20Announcement%202004.31%u2248%20Packet%20Storm&utmhn=packetstormsecurity.com&utmr=-&utmp=%2Ffiles%2F34377%2F&utmac=UA-18885198-1&utmcc=__utma%3D32867617.1329779352.1366881221.1366881221.1366881221.1%3B%2B__utmz%3D32867617.1366881221.1.1.utmccn%3D(direct)%7Cutmcsr%3D(direct)%7Cutmcmd%3D(none)" width="2" height="2" alt="" /></noscript>
<!-- Thu, 25 Apr 2013 09:13:39 GMT -->
</body>
</html>
    

- 漏洞信息

9995
CUPS Internet Printing Protocol (IPP) Implementation Empty UDP Datagram Remote DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

CUPS contains a flaw that may allow a remote denial of service. The issue is triggered when an empty UDP packet is sent to port 631 and will result in loss of availability for the cupsd.

- 时间线

2004-09-16 2004-08-21
2004-08-21 Unknow

- 解决方案

Upgrade to version 1.1.21rc2 or higher, as it has been reported to fix this vulnerability. Additionally, a patch has been provided to mitigate this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

CUPS UDP Packet Remote Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 11183
Yes No
2004-09-15 12:00:00 2009-07-12 07:06:00
Discovery of this issue is credited to Alvaro Martinez Echevarria.

- 受影响的程序版本

Trustix Secure Linux 2.1
Trustix Secure Linux 2.0
Trustix Secure Enterprise Linux 2.0
Sun Java Desktop System (JDS) 2.0
Sun Java Desktop System (JDS) 2003
Slackware Linux 10.0
Slackware Linux 9.1
Slackware Linux 9.0
Slackware Linux -current
SCO Unixware 7.1.4
SCO Unixware 7.1.3 up
SCO Open Server 6.0
SCO Open Server 5.0.7
RedHat Linux 9.0 i386
RedHat Linux 7.3 i386
RedHat Linux 7.3
Gentoo Linux 1.4 _rc3
Gentoo Linux 1.4 _rc2
Gentoo Linux 1.4 _rc1
Gentoo Linux 1.4
Gentoo Linux 1.2
Gentoo Linux 1.1 a
Gentoo Linux 0.7
Gentoo Linux 0.5
Easy Software Products CUPS 1.1.20
+ ALT Linux ALT Linux Compact 2.3
+ ALT Linux ALT Linux Junior 2.3
+ Gentoo Linux 1.4 _rc3
+ Gentoo Linux 1.4 _rc2
+ Gentoo Linux 1.4 _rc1
+ MandrakeSoft apcupsd 2006.0
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
+ S.u.S.E. Linux Personal 9.1
+ Ubuntu Ubuntu Linux 4.1 ppc
+ Ubuntu Ubuntu Linux 4.1 ia64
+ Ubuntu Ubuntu Linux 4.1 ia32
Easy Software Products CUPS 1.1.19 rc5
Easy Software Products CUPS 1.1.19
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Turbolinux Appliance Server 1.0 Workgroup Edition
+ Turbolinux Appliance Server 1.0 Hosting Edition
+ Turbolinux Appliance Server Hosting Edition 1.0
+ Turbolinux Appliance Server Workgroup Edition 1.0
+ Turbolinux Home
+ Turbolinux Turbolinux Desktop 10.0
+ Turbolinux Turbolinux Server 8.0
+ Turbolinux Turbolinux Workstation 8.0
Easy Software Products CUPS 1.1.18
+ Conectiva Linux 9.0
+ MandrakeSoft Corporate Server 2.1 x86_64
+ MandrakeSoft Corporate Server 2.1
+ MandrakeSoft Multi Network Firewall 2.0
+ Mandriva Linux Mandrake 9.0
+ S.u.S.E. Linux Personal 8.2
Easy Software Products CUPS 1.1.17
+ Red Hat Enterprise Linux AS 3
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
Easy Software Products CUPS 1.1.16
+ Mandriva Linux Mandrake 9.0
Easy Software Products CUPS 1.1.15
+ Conectiva Linux Enterprise Edition 1.0
+ S.u.S.E. Linux 8.1
Easy Software Products CUPS 1.1.14
+ Conectiva Linux 8.0
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Mandriva Linux Mandrake 8.2 ppc
+ Mandriva Linux Mandrake 8.2
Apple Mac OS X Server 10.3.5
Apple Mac OS X Server 10.3.4
Apple Mac OS X Server 10.3.3
Apple Mac OS X Server 10.3.2
Apple Mac OS X Server 10.3.1
Apple Mac OS X Server 10.3
Apple Mac OS X Server 10.2.8
Apple Mac OS X Server 10.2.7
Apple Mac OS X Server 10.2.6
Apple Mac OS X Server 10.2.5
Apple Mac OS X Server 10.2.4
Apple Mac OS X Server 10.2.3
Apple Mac OS X Server 10.2.2
Apple Mac OS X Server 10.2.1
Apple Mac OS X Server 10.2
Apple Mac OS X 10.3.5
Apple Mac OS X 10.3.4
Apple Mac OS X 10.3.3
Apple Mac OS X 10.3.2
Apple Mac OS X 10.3.1
Apple Mac OS X 10.3
Apple Mac OS X 10.2.8
Apple Mac OS X 10.2.7
Apple Mac OS X 10.2.6
Apple Mac OS X 10.2.5
Apple Mac OS X 10.2.4
Apple Mac OS X 10.2.3
Apple Mac OS X 10.2.2
Apple Mac OS X 10.2.1
Apple Mac OS X 10.2
Easy Software Products CUPS 1.1.21
+ Mandriva Linux Mandrake 10.1 x86_64
+ Mandriva Linux Mandrake 10.1

- 不受影响的程序版本

Easy Software Products CUPS 1.1.21
+ Mandriva Linux Mandrake 10.1 x86_64
+ Mandriva Linux Mandrake 10.1

- 漏洞讨论

CUPS is prone to a remotely exploitable denial of service vulnerability that may be triggered through port 631 by a zero-length UDP packet.

- 漏洞利用

The following example was provided using nmap:

nmap -sU -p 631 example.com

- 解决方案

SuSE has released advisory SUSE-SA:2004:031 to address this issue. Please see the attached advisory for information on obtaining and applying fixes.

ALT Linux have released an update to address this issue.

Red Hat has released advisory RHSA-2004:449-17 and fixes to address this issue on Red Hat Linux Enterprise platforms. Customers who are affected by this issue are advised to apply the appropriate updates. Customers subscribed to the Red Hat Network may apply the appropriate fixes using the Red Hat Update Agent (up2date). Please see referenced advisory for additional information.

Debian has released advisory DSA 545-1 to address this issue. Please see the attached advisory for further information on obtaining and applying fixes.

Mandrake has released advisory MDKSA-2004:097 to address this issue. Please see the attached advisory for further information on obtaining and applying fixes.

CUPS 1.1.21 has been released to address this issue. A vendor patch for version 1.2.20 is also available.

Trustix Secure Linux has released an advisory (TSLSA-2004-0047) along with fixes dealing with this, and other issues. Please see the referenced advisory for further information.

Gentoo has released an advisory (GLSA 200409-25) and fixes for this issue. To obtain fixes, run the following commands:
emerge sync
emerge -pv ">=net-print/cups-1.1.20-r2"
emerge ">=net-print/cups-1.1.20-r2"

Slackware Linux has released an advisory (SSA:2004-266-01) along with fixes dealing with this issue.

RedHat has released an advisory (FEDORA-2004-275) to address this issue in Fedora Core 2. Please see the referenced advisory for more information.

Apple has released updates for this issue that may be applied through Software Update. Manual updates are also available. Please see the Apple advisory (APPLE-SA-2004-09-30) for more information.

Sun Microsystems has made a security alert (Sun Alert ID: 57646) along with a fix dealing with this issue. Sun advises that all users download and install the update. To download and install the updated RPMs from the update servers select the following from the launch bar:

Launch >> Applications >> System Tools >> Online Update

For more information please see the referenced Sun advisory.

SCO has released advisory SCOSA-2004.15 along with fixes to address this issue in SCO Unixware 7.1.3up and 7.1.4. Please see the referenced advisory for further information.

Conectiva has released advisory CLA-2004:872 to address this issue. Please see the attached advisory for details on obtaining and applying fixes.

Fedora Legacy has released advisory FLSA-2004:2072 along with fixes for RedHat Linux dealing with this issue. Please see the referenced advisory for more information.

Turbolinux has released advisory TLSA-2004-33 along with fixes dealing with this issue. Please see the referenced advisory for more information.

SCO has released advisory SCOSA-2005.51, along with fixes to address this issue in SCO OpenServer 5.0.7 and 6.0.0. Please see the referenced advisory for further information.


Sun Java Desktop System (JDS) 2003
  • Sun patch-9321


Easy Software Products CUPS 1.1.14

Easy Software Products CUPS 1.1.15

Easy Software Products CUPS 1.1.16

Easy Software Products CUPS 1.1.17

Easy Software Products CUPS 1.1.18

Easy Software Products CUPS 1.1.19

Easy Software Products CUPS 1.1.19 rc5

Easy Software Products CUPS 1.1.20

Apple Mac OS X 10.2.8

Apple Mac OS X Server 10.2.8

Apple Mac OS X Server 10.3.5

Apple Mac OS X 10.3.5

Sun Java Desktop System (JDS) 2.0
  • Sun patch-9321


SCO Open Server 5.0.7

SCO Open Server 6.0

SCO Unixware 7.1.3 up

SCO Unixware 7.1.4

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站