Bug 47317 (CVE-2003-0788) - VUL-0: CVE-2003-0788 : cups: denial-of-service due to bug in libcups
Summary: VUL-0: CVE-2003-0788 : cups: denial-of-service due to bug in libcups
Status: RESOLVED FIXED
Alias: CVE-2003-0788
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: All Linux
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: CVE-2003-0788: CVSS v2 Base Score: 5....
Keywords:
Depends on:
Blocks:
 
Reported: 2003-10-14 23:24 UTC by Thomas Biege
Modified: 2021-09-26 10:29 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
discussion (5.55 KB, text/plain)
2003-10-14 23:24 UTC, Thomas Biege
Details
putonftp-8.2.cups (202 bytes, text/plain)
2003-10-14 23:45 UTC, Thomas Biege
Details
patchinfo.cups (441 bytes, text/plain)
2003-10-14 23:45 UTC, Thomas Biege
Details
cups-1.1.17-loop.patch (943 bytes, patch)
2003-11-04 18:36 UTC, Thomas Biege
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Biege 2003-10-14 23:24:09 UTC
Hi Klaus, 
the disussion is attched...
Comment 1 Thomas Biege 2003-10-14 23:24:09 UTC
<!-- SBZ_reproduce  -->
.
Comment 2 Thomas Biege 2003-10-14 23:24:54 UTC
Created attachment 14908 [details]
discussion
Comment 3 Thomas Biege 2003-10-14 23:45:08 UTC
Created attachment 14909 [details]
putonftp-8.2.cups
Comment 4 Thomas Biege 2003-10-14 23:45:34 UTC
Created attachment 14910 [details]
patchinfo.cups
Comment 5 Klaus Singvogel 2003-10-15 00:09:06 UTC
Available fix seems not to be correct (according to author), because 
it incorrectly returns -1, which causes other conflicts. 
 
and: This problem affects all version of CUPS up to 1.1.19 (= incl. 
SuLi 9.0) if author understands problem correctly. 
 
But author is currently not reachable (maybe doing his contractor job 
a Apple) and it may take its time to verify fixes according to CUPS 
Software Trouble Report system. 
 
First (incorrect) try for fix is found here: 
 http://bugzilla.redhat.com/bugzilla/attachment.cgi?id=94115&action=view 
CUPS STR page is this: 
 http://www.cups.org/str.php?L315 
Comment 6 Thomas Biege 2003-10-20 20:49:00 UTC
Is there a backup for him?  
  
Can you reproduce this bug with the newest CUPS version? 
Comment 7 Klaus Singvogel 2003-10-20 23:43:06 UTC
No, no backup. 
 
Seems that only the Red Hat customer (means not even Red Hat) is 
possible to produce this bug. No code for reproducing the problem 
can be found on cups.org neither on bugzilla.redhat.com 
Comment 8 Thomas Biege 2003-10-31 21:02:49 UTC
Date: Thu, 30 Oct 2003 15:45:37 -0200 
From: Andreas <andreas@conectiva.com.br> 
To: vendor-sec@lst.de 
Cc: Michael Sweet <mike@easysw.com> 
Subject: Re: [vendor-sec] Issue in CUPS with security consequences 
 
On Fri, Oct 03, 2003 at 10:03:41AM +0100, Mark J Cox wrote: 
> Tim Waugh developed a patch: 
> 
>       http://bugzilla.redhat.com/bugzilla/attachment.cgi?id=94115&action=view 
> 
> In order to exploit this bug, an attacker would need the ability to make a 
> TCP connection to the IPP port. 
 
Tim's new patch and CUPS' str entry are at 
 
http://www.cups.org/str.php?L315+P0+S0+C0+I0+E0+Q 
 
Comment 9 Thomas Biege 2003-11-03 18:50:59 UTC
CAN-2003-0788 
Comment 10 Thomas Biege 2003-11-04 18:08:01 UTC
http://www.heise.de/newsticker/data/dab-04.11.03-001/ 
 
We need to hurry up. 
Comment 11 Klaus Singvogel 2003-11-04 18:24:34 UTC
I must have been removed from update notification of CUPS str. :( 
Currently the website www.cups.org is not reachable. :(  
    Connection timed out. 
Comment 12 Thomas Biege 2003-11-04 18:35:10 UTC
I can connect by using proxy.arcor-ip.de:8080 
I'll append the patch... 
Comment 13 Thomas Biege 2003-11-04 18:36:09 UTC
Created attachment 15216 [details]
cups-1.1.17-loop.patch
Comment 14 Thomas Biege 2003-11-04 18:38:15 UTC
little note: 
"cups-1.1.17-loop.patch seems to be the relevant bit of the 1.1.18->1.1.19 
patch.  This patch presumes that the STR75 patch has already been applied.2 
Comment 15 Klaus Singvogel 2003-11-04 23:16:55 UTC
made packages for: 8.1 (= UL1), 8.2, 8.3 
not affected: 7.3, 9.0 
patchinfo submitted 
Comment 16 Klaus Singvogel 2003-11-04 23:20:34 UTC
I forget to mention that I didn't build a patch for SLEC, 
as Mike Hager is currently not reachable and we don't 
know what to do, what he is planing. 
Comment 17 Thomas Biege 2003-11-04 23:27:24 UTC
reassigning to security-team till bug will be released. 
Comment 18 Thomas Biege 2003-11-07 01:47:23 UTC
approved packages 
Comment 19 Thomas Biege 2009-10-13 19:40:29 UTC
CVE-2003-0788: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)