Attacking Unix systems via CUPS Part I