Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0811201927190.20524@faron.mitre.org>
Date: Thu, 20 Nov 2008 19:41:06 -0500 (EST)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: oss-security@...ts.openwall.com
cc: "Steven M. Christey" <coley@...re.org>
Subject: Re: CVE request: CUPS DoS via RSS subscriptions


On Wed, 19 Nov 2008, Kees Cook wrote:

> I'd like to get a CVE assigned for the RSS subscription DoS mentioned
> here[1].  It seems that CUPS upstream already fixed[2] the issue[3] in
> their 1.3.8 release.  Prior to 1.3.8, the server can be made to crash
> when visiting a malicious website due to CUPS general CSRF issues.

I treated this as two CVEs, one for the CSRF-simplifying attack, and a
separate one for the CUPS server crash (assuming that cupsd should not be
crashable by non-root authenticated users).

- Steve


======================================================
Name: CVE-2008-5183
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5183
Reference: MISC:http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/
Reference: CONFIRM:https://bugs.launchpad.net/ubuntu/+source/cups/+bug/298241
Reference: MLIST:[oss-security] 20081119 CVE request: CUPS DoS via RSS subscriptions
Reference: URL:http://www.openwall.com/lists/oss-security/2008/11/19/3
Reference: MLIST:[oss-security] 20081119 Re: CVE request: CUPS DoS via RSS subscriptions
Reference: URL:http://www.openwall.com/lists/oss-security/2008/11/19/4

cupsd in CUPS before 1.3.8 allows local users, and possibly remote
attackers, to cause a denial of service (daemon crash) by adding a
large number of RSS Subscriptions, which triggers a NULL pointer
dereference.  NOTE: this issue can be triggered remotely by leveraging
CVE-2008-5184.


======================================================
Name: CVE-2008-5184
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5184
Reference: MISC:http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/
Reference: CONFIRM:http://www.cups.org/str.php?L2774
Reference: MLIST:[oss-security] 20081119 CVE request: CUPS DoS via RSS subscriptions
Reference: URL:http://www.openwall.com/lists/oss-security/2008/11/19/3

The web interface (cgi-bin/admin.c) in CUPS before 1.3.8 uses the
guest username when a user is not logged on to the web server, which
makes it easier for remote attackers to bypass intended policy and
conduct CSRF attacks via the (1) add and (2) cancel RSS subscription
functions.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.