"CUPS is prone to multiple heap-based buffer-overflow vulnerabilities
because it fails to properly bounds-check user-supplied input before
copying it into a finite-sized buffer.
Exploiting these issues may allow remote attackers to execute arbitrary
code in the context of the affected application. Failed exploit attempts
will likely cause denial-of-service conditions."
This issue specifically targets RHEL3 and RHEL4. It is recommended to
update cups to the latest patch level to avoid this issue.