COMMAND
CUPS
SYSTEMS AFFECTED
CUPS prior to 1.1.5
PROBLEM
Following is based on a Linux-Mandrake Security Update Advisory.
A problem exists in all versions of CUPS prior to 1.1.5 with the
httpGets() function. It could go into an infinite loop if a line
longer than the input buffer size was sent by a client. This
could be used as a DoS attack. As well, all occurances of
sprintf() calls were changed to snprintf(), and all occurances of
strcpy() calls were changed to strncpy() calls, both of which
protect against buffer overflows. Finally, CUPS now defaults to
not broadcasting the printer information anymore by default, and
by default access is only allowed from the local machine.
SOLUTION
Patches:
Linux-Mandrake 7.2: 7.2/RPMS/cups-1.1.6-10.1mdk.i586.rpm
7.2/RPMS/cups-devel-1.1.6-10.1mdk.i586.rpm
7.2/SRPMS/cups-1.1.6-10.1mdk.src.rpm