Advisory Details

October 9th, 2008

Apple CUPS HP-GL/2 Filter Remote Code Execution Vulnerability

ZDI-08-067
ZDI-CAN-367

CVE ID CVE-2008-3641
CVSS SCORE
AFFECTED VENDORS Apple
AFFECTED PRODUCTS OS X
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['6325']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple CUPS. Authentication is not required to exploit this vulnerability.

The specific flaw exists in the Hewlett-Packard Graphics Language filter. Inadequate bounds checking on the pen width and pen color opcodes result in an arbitrary memory overwrite allowing for the execution of arbitrary code as the "hgltops" process uid.

ADDITIONAL DETAILS Apple has issued an update to correct this vulnerability. More details can be found at:
http://support.apple.com/kb/HT3216
DISCLOSURE TIMELINE
  • 2008-08-19 - Vulnerability reported to vendor
  • 2008-10-09 - Coordinated public release of advisory
CREDIT regenrecht
BACK TO ADVISORIES