Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-18248

Опубликовано: 26 мар. 2018
Источник: debian
EPSS Низкий

Описание

The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cupsfixed2.2.6-1package
cupsfixed2.2.1-8+deb9u3stretchpackage

Примечания

  • https://github.com/apple/cups/commit/49fa4983f25b64ec29d548ffa3b9782426007df3

  • https://github.com/apple/cups/issues/5143

EPSS

Процентиль: 77%
0.01002
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 8 лет назад

The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.

CVSS3: 5.5
redhat
больше 8 лет назад

The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.

CVSS3: 5.3
nvd
почти 8 лет назад

The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.

CVSS3: 5.3
github
больше 3 лет назад

The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.

CVSS3: 5.3
fstec
больше 8 лет назад

Уязвимость функции add_job (scheduler/ipp.c) сервера печати CUPS, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 77%
0.01002
Низкий