Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-2180

Опубликовано: 05 сент. 2019
Источник: debian
EPSS Низкий

Описание

In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cupsfixed2.2.12-1package
cupsfixed2.2.10-6+deb10u1busterpackage
cupsfixed2.2.1-8+deb9u4stretchpackage

Примечания

  • Covers the "Fixed IPP buffer overflow (rdar://50035411)" angle of

  • https://github.com/apple/cups/commit/f24e6cf6a39300ad0c3726a41a4aab51ad54c109

EPSS

Процентиль: 3%
0.00017
Низкий

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 6 лет назад

In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation.

CVSS3: 5.5
nvd
больше 6 лет назад

In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation.

github
больше 3 лет назад

In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation.

EPSS

Процентиль: 3%
0.00017
Низкий