‘Apple CUPS HP-GL/2 filter Code Execution Vulnerability’

Summary

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple CUPS. Authentication is not required to exploit this vulnerability.’

Credit:

‘The information has been provided by The Zero Day Initiative (ZDI).
The original article can be found at: http://www.zerodayinitiative.com/advisories/ZDI-08-067


Details

Vulnerable Systems:
 * Apple CUPS version 1.3.7

The specific flaw exists in the Hewlett-Packard Graphics Language filter. Inadequate bounds checking on the pen width and pen color opcodes result in an arbitrary memory overwrite allowing for the execution of arbitrary code as the ‘hgltops’ process uid.

Vendor Response:
Apple has issued an update to correct this vulnerability. More details can be found at:
http://support.apple.com/kb/HT3216

Disclosure Timeline:
2008-08-19 – Vulnerability reported to vendor
2008-10-09 – Coordinated public release of advisory

CVE Information:
CVE-2008-3641

Categories: UNIX