exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2007.086

Mandriva Linux Security Advisory 2007.086
Posted Apr 17, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw was discovered in how CUPS handled SSL negotiation that could allow a remote attacker capable of connecting to the CUPS daemon to cause a DoS to other CUPS users.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2007-0720
SHA-256 | 2c75cf3ebd48ac4a57d8ee7059eb95c7119a711d5061da1f90d4fb0430cbc0f0

Mandriva Linux Security Advisory 2007.086

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:086
https://www.mandriva.com/security/
_______________________________________________________________________

Package : cups
Date : April 16, 2007
Affected: 2007.0, Corporate 3.0, Corporate 4.0
_______________________________________________________________________

Problem Description:

A flaw was discovered in how CUPS handled SSL negotiation that could
allow a remote attacker capable of connecting to the CUPS daemon to
cause a DoS to other CUPS users.

Updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0720
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.0:
58148107fd3c3a3a58cf40893f210d19 2007.0/i586/cups-1.2.4-1.2mdv2007.0.i586.rpm
facc569515fe2bfb4cd486c97933db38 2007.0/i586/cups-common-1.2.4-1.2mdv2007.0.i586.rpm
4d098ae29c18349d340358a8dd34dd71 2007.0/i586/cups-serial-1.2.4-1.2mdv2007.0.i586.rpm
170742c5f714668e61e86f8c81a8b4ed 2007.0/i586/libcups2-1.2.4-1.2mdv2007.0.i586.rpm
5f0235cecf775ca3fe56ec84cc84d20f 2007.0/i586/libcups2-devel-1.2.4-1.2mdv2007.0.i586.rpm
bd0b0eca41194be209e4241d719e1599 2007.0/i586/php-cups-1.2.4-1.2mdv2007.0.i586.rpm
dfee0796289f4931ce50315338a9039a 2007.0/SRPMS/cups-1.2.4-1.2mdv2007.0.src.rpm

Mandriva Linux 2007.0/X86_64:
f6ff5e5b6974a5643e95d25064a0d376 2007.0/x86_64/cups-1.2.4-1.2mdv2007.0.x86_64.rpm
000003ae00365d65f11d2ba66e23f497 2007.0/x86_64/cups-common-1.2.4-1.2mdv2007.0.x86_64.rpm
abd32c1b9604f1b37a2aa2b0d388f815 2007.0/x86_64/cups-serial-1.2.4-1.2mdv2007.0.x86_64.rpm
275f077df3d38e0d37c5c364dc213141 2007.0/x86_64/lib64cups2-1.2.4-1.2mdv2007.0.x86_64.rpm
9a1fb3565074c9f4094e66085f00cdcf 2007.0/x86_64/lib64cups2-devel-1.2.4-1.2mdv2007.0.x86_64.rpm
dd2efd3e7bd0fa76688331be58b41e61 2007.0/x86_64/php-cups-1.2.4-1.2mdv2007.0.x86_64.rpm
dfee0796289f4931ce50315338a9039a 2007.0/SRPMS/cups-1.2.4-1.2mdv2007.0.src.rpm

Corporate 3.0:
e1a992d26240a580991dac68aec96bff corporate/3.0/i586/cups-1.1.20-5.11.C30mdk.i586.rpm
098a0436371e4f2747f46739206c178f corporate/3.0/i586/cups-common-1.1.20-5.11.C30mdk.i586.rpm
03b7c186d7594edc6434851ee21f995a corporate/3.0/i586/cups-serial-1.1.20-5.11.C30mdk.i586.rpm
440f161baeb56539f78571be69ed70e2 corporate/3.0/i586/libcups2-1.1.20-5.11.C30mdk.i586.rpm
fb5996ef6a12ab6f290a7594fa3a3cb0 corporate/3.0/i586/libcups2-devel-1.1.20-5.11.C30mdk.i586.rpm
3c8b04f6b0af669313979cb23feddb6d corporate/3.0/SRPMS/cups-1.1.20-5.11.C30mdk.src.rpm

Corporate 3.0/X86_64:
86852aacc829b9efcd03b544a55fdca0 corporate/3.0/x86_64/cups-1.1.20-5.11.C30mdk.x86_64.rpm
ebd138190f39f88c1eace2aa522ea034 corporate/3.0/x86_64/cups-common-1.1.20-5.11.C30mdk.x86_64.rpm
3fad1b6fa25230cd0dcf078b8edd24ad corporate/3.0/x86_64/cups-serial-1.1.20-5.11.C30mdk.x86_64.rpm
35a7e3c3dee5397c703d4ced6be57138 corporate/3.0/x86_64/lib64cups2-1.1.20-5.11.C30mdk.x86_64.rpm
f1098a89091ab49d1a65c3827f222e45 corporate/3.0/x86_64/lib64cups2-devel-1.1.20-5.11.C30mdk.x86_64.rpm
3c8b04f6b0af669313979cb23feddb6d corporate/3.0/SRPMS/cups-1.1.20-5.11.C30mdk.src.rpm

Corporate 4.0:
73b593b17afd8c7d3e4df79e382c6bf9 corporate/4.0/i586/cups-1.2.4-0.2.20060mlcs4.i586.rpm
287de87164fd603d9233ea5dd2460878 corporate/4.0/i586/cups-common-1.2.4-0.2.20060mlcs4.i586.rpm
2f164f0d981a3f2cbfaedadc9b60ec82 corporate/4.0/i586/cups-serial-1.2.4-0.2.20060mlcs4.i586.rpm
f84b48d2c09d77d8a4a038724f90c8ce corporate/4.0/i586/libcups2-1.2.4-0.2.20060mlcs4.i586.rpm
092cb69b720a81b2fc8f8374eefde9b5 corporate/4.0/i586/libcups2-devel-1.2.4-0.2.20060mlcs4.i586.rpm
6fb17dd9e47a3f1fb081b0abeba74a21 corporate/4.0/i586/php-cups-1.2.4-0.2.20060mlcs4.i586.rpm
4aa9d021fb9ca6947ee0042842c0d9f7 corporate/4.0/SRPMS/cups-1.2.4-0.2.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
6910e854380e4bdfd873f030e6cf56a1 corporate/4.0/x86_64/cups-1.2.4-0.2.20060mlcs4.x86_64.rpm
3ea4c63c9a77d8853b31edc6b27cd947 corporate/4.0/x86_64/cups-common-1.2.4-0.2.20060mlcs4.x86_64.rpm
202a71ab90bd78c62b49bcfdb8f87e6d corporate/4.0/x86_64/cups-serial-1.2.4-0.2.20060mlcs4.x86_64.rpm
adbd7e8c128a869f72eec99f8ab2675c corporate/4.0/x86_64/lib64cups2-1.2.4-0.2.20060mlcs4.x86_64.rpm
3511b5438cb8539645853e125ce633d2 corporate/4.0/x86_64/lib64cups2-devel-1.2.4-0.2.20060mlcs4.x86_64.rpm
8ac429c561e74613ad99a90ca81bf081 corporate/4.0/x86_64/php-cups-1.2.4-0.2.20060mlcs4.x86_64.rpm
4aa9d021fb9ca6947ee0042842c0d9f7 corporate/4.0/SRPMS/cups-1.2.4-0.2.20060mlcs4.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

https://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGI84amqjQ0CJFipgRAgYDAJsGtmc+dDF4MVXsbIZ4yf8B5riUXwCg4IFQ
CgJu6KFTY1qUujdG8UgYemI=
=gZF6
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close