oss-sec mailing list archives

Re: CVE request: cups - potential integer overflow in PNG image reader [was: CUPS DoS via RSS subscriptions]


From: Jan Lieskovsky <jlieskov () redhat com>
Date: Tue, 25 Nov 2008 12:39:00 +0100

Hello Steve and Eygene,

On Fri, 2008-11-21 at 07:23 -0800, Michael Sweet wrote:
Eygene Ryabinkin wrote:
Steve, good day.

Thu, Nov 20, 2008 at 07:41:06PM -0500, Steven M. Christey wrote:
I treated this as two CVEs, one for the CSRF-simplifying attack, and a
separate one for the CUPS server crash (assuming that cupsd should not be
crashable by non-root authenticated users).

Please note that as it was discuissed in thread started with
  http://www.openwall.com/lists/oss-security/2008/11/19/4
even 1.3.9 is crashable by non-root authenticated users by adding
a big number of subscriptions (don't know about RSS ones, though
subscription for mailing upon job completion does its job).  But
I imagine that CVE-2008-5184 can't be used for 1.3.9, so remote
attack is not feasible.

I expect that the fix will go into 1.3.10:
  http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt


Eygene - Thanks for the post! Btw. this CHANGES-1.3.txt files also
mentions another security flaw, i.e incomplete fix for CVE-2008-1722:

<cite>

- SECURITY: The PNG image reading code did not validate the
          image size properly, leading to a potential buffer overflow
          (STR #2974)

</cite>

The relevant upstream cups BTS post together with patch attached is
here:

Advisory: http://www.cups.org/str.php?L2974
Patch: http://www.cups.org/strfiles/2974/str2974.patch

This issue seems to be introduced by the fix for CVE-2008-1722, i.e:
Advisory: http://www.cups.org/str.php?L2790
Patch: http://www.cups.org/strfiles/2790/str2790.patch

Steve, could you please allocate a new CVE identifier for this one?

Thanks, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team



Current thread: