DSA-3172-1 cups -- security update

Related Vulnerabilities: CVE-2014-9679  

Peter De Wachter discovered that CUPS, the Common UNIX Printing System, did not correctly parse compressed raster files. By submitting a specially crafted raster file, a remote attacker could use this vulnerability to trigger a buffer overflow. For the stable distribution (wheezy), this problem has been fixed in version 1.5.3-5+deb7u5. For the upcoming stable distribution (jessie) and unstable distribution (sid), this problem has been fixed in version 1.7.5-11. We recommend that you upgrade your cups packages.

Debian Security Advisory

DSA-3172-1 cups -- security update

Date Reported:
25 Feb 2015
Affected Packages:
cups
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 778387.
In Mitre's CVE dictionary: CVE-2014-9679.
More information:

Peter De Wachter discovered that CUPS, the Common UNIX Printing System, did not correctly parse compressed raster files. By submitting a specially crafted raster file, a remote attacker could use this vulnerability to trigger a buffer overflow.

For the stable distribution (wheezy), this problem has been fixed in version 1.5.3-5+deb7u5.

For the upcoming stable distribution (jessie) and unstable distribution (sid), this problem has been fixed in version 1.7.5-11.

We recommend that you upgrade your cups packages.