10
CVSSv2

CVE-2015-1158

Published: 26/06/2015 Updated: 23/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The add_job function in scheduler/ipp.c in cupsd in CUPS prior to 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote malicious users to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2) IPP_PRINT_JOB request, as demonstrated by replacing the configuration file and consequently executing arbitrary code.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cups cups

Vendor Advisories

Several security issues were fixed in CUPS ...
A string reference count bug was found in cupsd, causing premature freeing of string objects An attacker can submit a malicious print job that exploits this flaw to dismantle ACLs protecting privileged operations, allowing a replacement configuration file to be uploaded which in turn allows the attacker to run arbitrary code in the CUPS server (CV ...
A string reference count bug was found in cupsd, causing premature freeing of string objects An attacker could submit a malicious print job that exploits this flaw to dismantle ACLs protecting privileged operations, allowing a replacement configuration file to be uploaded, which in turn allowed the attacker to run arbitrary code on the CUPS server ...

Exploits

#!/usr/bin/python # Exploit Title: CUPS Reference Count Over Decrement Remote Code Execution # Google Dork: n/a # Date: 2/2/17 # Exploit Author: @0x00string # Vendor Homepage: cupsorg # Software Link: githubcom/apple/cups/releases/tag/release-202 # Version: <203 # Tested on: Ubuntu 14/15 # CVE : CVE-2015-1158 import os, re, socket, ...
Source: googleprojectzeroblogspotse/2015/06/owning-internet-printing-case-study-inhtml Abstract Modern exploit mitigations draw attackers into a game of diminishing marginal returns With each additional mitigation added, a subset of software bugs become unexploitable, and others become difficult to exploit, requiring application or eve ...
CUPS versions prior to 203 suffers from improper teardown and cross site scripting vulnerabilities ...
CUPS versions prior to 203 reference count over decrement remote code execution exploit ...