A vulnerability in CUPS allows remote attackers to cause a denial of service when sending a carefully-crafted UDP packet to the IPP port.
Package | net-print/cups on all architectures |
---|---|
Affected versions | < 1.1.20-r2 |
Unaffected versions | >= 1.1.20-r2 |
The Common UNIX Printing System (CUPS) is a cross-platform print spooler.
Alvaro Martinez Echevarria discovered a hole in the CUPS Internet Printing Protocol (IPP) implementation that allows remote attackers to cause CUPS to stop listening on the IPP port.
A remote user with malicious intent can easily cause a denial of service to the CUPS daemon by sending a specially-crafted UDP datagram packet to the IPP port.
There is no known workaround at this time.
All CUPS users should upgrade to the latest version:
# emerge sync # emerge -pv ">=net-print/cups-1.1.20-r2" # emerge ">=net-print/cups-1.1.20-r2"
Release date
September 20, 2004
Latest revision
September 21, 2004: 02
Severity
normal
Exploitable
remote
Bugzilla entries