ID

VAR-200909-0754


CVE

CVE-2009-2807


TITLE

CUPS USB backend Local Heap Based Buffer Overflow Vulnerability

Trust: 0.9

sources: BID: 36350 // CNNVD: CNNVD-200909-277

DESCRIPTION

Heap-based buffer overflow in the USB backend in CUPS in Apple Mac OS X 10.5.8 allows local users to gain privileges via unspecified vectors. CUPS (Common UNIX Printing System) is prone to a local heap-based buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Exploiting this issue will allow local attackers to execute arbitrary code with superuser privileges and completely compromise affected computers. Failed exploit attempts will result in a denial-of-service condition. Local users can gain privileges with the help of unknown vectors. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Apple Mac OS X Security Update Fixes Multiple Vulnerabilities SECUNIA ADVISORY ID: SA36701 VERIFY ADVISORY: http://secunia.com/advisories/36701/ DESCRIPTION: Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities. 1) An error in Alias Manager when processing alias files can be exploited to cause a buffer overflow and potentially execute arbitrary code. 2) An error in Resource Manager when processing resource forks can be exploited to corrupt memory and potentially execute arbitrary code. 3) Multiple vulnerabilities in ClamAV can be exploited to bypass certain security restrictions, cause a DoS, and potentially compromise a vulnerable system. For more information: SA34566 SA34612 4) An integer overflow error exists when processing ColorSync profiles embedded in images. This can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code via a specially crafted image. 5) An integer overflow error exists in CoreGraphics when processing JBIG2 streams embedded in PDF files. This can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code via a specially crafted PDF file. 6) An error in CoreGraphics can be exploited to cause a heap-based buffer overflow potentially execute arbitrary code when drawing long text strings. This is related to vulnerability #1 in: SA36269 7) A NULL-pointer dereference error in CUPS can be exploited to cause a crash. 9) Multiple vulnerabilities in Adobe Flash Player can be exploited by malicious people to bypass security features, gain knowledge of sensitive information, or compromise a user's system. For more information: SA35948 10) Multiple errors exist in ImageIO when processing PixarFilm encoded TIFF images. These can be exploited to trigger memory corruptions and potentially execute arbitrary code via specially crafted TIFF files. 11) An error exists in Launch Services when handling files having a ".fileloc" extension. This can be exploited to potentially execute arbitrary code by tricking a user into opening a ".fileloc" file. 12) An error exists in Launch Services when handling exported document types presented when an application is downloaded. This can be exploited to associate a safe file extension with an unsafe Uniform Type Identifier (UTI) and execute arbitrary code. 13) An error in MySQL can be exploited by malicious, local users to bypass certain security restrictions. For more information: SA30134 14) Multiple vulnerabilities in PHP have an unknown impact or can potentially be exploited by malicious people to disclose sensitive information or cause a DoS (Denial of Service). For more information: SA34081 15) An error exists in Samba when handling error conditions. This can be exploited by a user without a configured home directory to access the contents of the file system by connecting to the Windows File Sharing service. 16) Input passed in search requests containing non UTF-8 encoded data to Wiki Server is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. SOLUTION: Update to Mac OS X v10.6.1 or apply Security Update 2009-005. Security Update 2009-005 (Tiger PPC): http://support.apple.com/downloads/DL931/en_US/SecUpd2009-005PPC.dmg Security Update 2009-005 (Tiger Intel): http://support.apple.com/downloads/DL932/en_US/SecUpd2009-005Intel.dmg Security Update 2009-005 Server (Tiger Univ): http://support.apple.com/downloads/DL933/en_US/SecUpdSrvr2009-005Univ.dmg Security Update 2009-005 Server (Tiger PPC): http://support.apple.com/downloads/DL934/en_US/SecUpdSrvr2009-005PPC.dmg Mac OS X Server v10.6.1 Update: http://support.apple.com/downloads/DL929/en_US/MacOSXServerUpd10.6.1.dmg Security Update 2009-005 Server (Leopard): http://support.apple.com/downloads/DL936/en_US/SecUpdSrvr2009-005.dmg Security Update 2009-005 (Leopard): http://support.apple.com/downloads/DL935/en_US/SecUpd2009-005.dmg Mac OS X v10.6.1 Update: http://support.apple.com/downloads/DL930/en_US/MacOSXUpd10.6.1.dmg PROVIDED AND/OR DISCOVERED BY: 1, 2, 4, 8, 10-12, 16) Reported by the vendor. 5) The vendor credits Will Dormann of CERT/CC. 6) The vendor credits Will Drewry of Google. 15) The vendor credits J. David Hester of LCG Systems National Institutes of Health. ORIGINAL ADVISORY: http://support.apple.com/kb/HT3864 http://support.apple.com/kb/HT3865 OTHER REFERENCES: SA30134: http://secunia.com/advisories/30134/ SA34081: http://secunia.com/advisories/34081/ SA34481: http://secunia.com/advisories/34481/ SA34566: http://secunia.com/advisories/34566/ SA34612: http://secunia.com/advisories/34612/ SA35948: http://secunia.com/advisories/35948/ SA36269: http://secunia.com/advisories/36269/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2009-2807 // JVNDB: JVNDB-2009-002134 // BID: 36350 // VULHUB: VHN-40253 // PACKETSTORM: 81208

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.5.8

Trust: 1.6

vendor:applemodel:mac os x serverscope:eqversion:10.5.8

Trust: 1.6

vendor:cupsmodel:cupsscope:ltversion:1.4.0

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:easymodel:software products cupsscope:eqversion:1.3.10

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.9

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.8

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.7

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.6

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.5

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.3

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.3.2

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.12

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.10

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.9

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.8

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.4

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.2.2

Trust: 0.3

vendor:easymodel:software products cups rc1scope:eqversion:1.1.23

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.23

Trust: 0.3

vendor:easymodel:software products cups rc1scope:eqversion:1.1.22

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.22

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.21

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.20

Trust: 0.3

vendor:easymodel:software products cups rc5scope:eqversion:1.1.19

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.19

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.18

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.17

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.16

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.15

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.14

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.13

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.12

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.10

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.7

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.6

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.4-5

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.4-3

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.4-2

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.4

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.1.1

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.0.4-8

Trust: 0.3

vendor:easymodel:software products cupsscope:eqversion:1.0.4

Trust: 0.3

vendor:drphibezmodel:and nitro187 guild ftpd rc5scope:eqversion:1.1.19

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

sources: BID: 36350 // JVNDB: JVNDB-2009-002134 // CNNVD: CNNVD-200909-277 // NVD: CVE-2009-2807

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2807
value: HIGH

Trust: 1.0

NVD: CVE-2009-2807
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200909-277
value: HIGH

Trust: 0.6

VULHUB: VHN-40253
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-2807
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-40253
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-40253 // JVNDB: JVNDB-2009-002134 // CNNVD: CNNVD-200909-277 // NVD: CVE-2009-2807

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-40253 // JVNDB: JVNDB-2009-002134 // NVD: CVE-2009-2807

THREAT TYPE

local

Trust: 0.9

sources: BID: 36350 // CNNVD: CNNVD-200909-277

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200909-277

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002134

PATCH

title:HT3865url:http://support.apple.com/kb/HT3865

Trust: 0.8

title:HT3865url:http://support.apple.com/kb/HT3865?viewlocale=ja_JP

Trust: 0.8

title:L588url:http://www.cups.org/articles.php?L588

Trust: 0.8

sources: JVNDB: JVNDB-2009-002134

EXTERNAL IDS

db:BIDid:36350

Trust: 2.8

db:NVDid:CVE-2009-2807

Trust: 2.8

db:SECUNIAid:36701

Trust: 2.6

db:SECTRACKid:1022898

Trust: 1.1

db:OSVDBid:57951

Trust: 1.1

db:JVNDBid:JVNDB-2009-002134

Trust: 0.8

db:CNNVDid:CNNVD-200909-277

Trust: 0.7

db:APPLEid:APPLE-SA-2009-09-10-2

Trust: 0.6

db:VULHUBid:VHN-40253

Trust: 0.1

db:PACKETSTORMid:81208

Trust: 0.1

sources: VULHUB: VHN-40253 // BID: 36350 // JVNDB: JVNDB-2009-002134 // PACKETSTORM: 81208 // CNNVD: CNNVD-200909-277 // NVD: CVE-2009-2807

REFERENCES

url:http://www.securityfocus.com/bid/36350

Trust: 2.5

url:http://secunia.com/advisories/36701

Trust: 2.5

url:http://support.apple.com/kb/ht3865

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2009/sep/msg00004.html

Trust: 1.7

url:http://www.cups.org/articles.php?l588

Trust: 1.7

url:http://osvdb.org/57951

Trust: 1.1

url:http://www.securitytracker.com/id?1022898

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/53168

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2807

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2807

Trust: 0.8

url:http://www.cups.org

Trust: 0.3

url:http://secunia.com/advisories/35948/

Trust: 0.1

url:http://support.apple.com/downloads/dl936/en_us/secupdsrvr2009-005.dmg

Trust: 0.1

url:http://support.apple.com/downloads/dl933/en_us/secupdsrvr2009-005univ.dmg

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/34481/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://support.apple.com/downloads/dl932/en_us/secupd2009-005intel.dmg

Trust: 0.1

url:http://secunia.com/advisories/36269/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://support.apple.com/kb/ht3864

Trust: 0.1

url:http://support.apple.com/downloads/dl930/en_us/macosxupd10.6.1.dmg

Trust: 0.1

url:http://secunia.com/advisories/34566/

Trust: 0.1

url:http://support.apple.com/downloads/dl935/en_us/secupd2009-005.dmg

Trust: 0.1

url:http://secunia.com/advisories/36701/

Trust: 0.1

url:http://support.apple.com/downloads/dl934/en_us/secupdsrvr2009-005ppc.dmg

Trust: 0.1

url:http://support.apple.com/downloads/dl931/en_us/secupd2009-005ppc.dmg

Trust: 0.1

url:http://secunia.com/advisories/34081/

Trust: 0.1

url:http://secunia.com/advisories/34612/

Trust: 0.1

url:http://secunia.com/advisories/30134/

Trust: 0.1

url:http://support.apple.com/downloads/dl929/en_us/macosxserverupd10.6.1.dmg

Trust: 0.1

sources: VULHUB: VHN-40253 // BID: 36350 // JVNDB: JVNDB-2009-002134 // PACKETSTORM: 81208 // CNNVD: CNNVD-200909-277 // NVD: CVE-2009-2807

CREDITS

Reported in Apple Security Update 2009-005

Trust: 0.9

sources: BID: 36350 // CNNVD: CNNVD-200909-277

SOURCES

db:VULHUBid:VHN-40253
db:BIDid:36350
db:JVNDBid:JVNDB-2009-002134
db:PACKETSTORMid:81208
db:CNNVDid:CNNVD-200909-277
db:NVDid:CVE-2009-2807

LAST UPDATE DATE

2024-11-23T20:47:34.916000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-40253date:2017-08-17T00:00:00
db:BIDid:36350date:2009-09-14T19:41:00
db:JVNDBid:JVNDB-2009-002134date:2009-10-23T00:00:00
db:CNNVDid:CNNVD-200909-277date:2009-09-15T00:00:00
db:NVDid:CVE-2009-2807date:2024-11-21T01:05:46.917

SOURCES RELEASE DATE

db:VULHUBid:VHN-40253date:2009-09-14T00:00:00
db:BIDid:36350date:2009-09-10T00:00:00
db:JVNDBid:JVNDB-2009-002134date:2009-10-23T00:00:00
db:PACKETSTORMid:81208date:2009-09-11T14:30:33
db:CNNVDid:CNNVD-200909-277date:2009-09-14T00:00:00
db:NVDid:CVE-2009-2807date:2009-09-14T16:30:00.343