Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-32324

Опубликовано: 01 июн. 2023
Источник: debian
EPSS Низкий

Описание

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
cupsfixed2.4.2-4package
cupsfixed2.4.2-3+deb12u1bookwormpackage
cupsfixed2.3.3op2-3+deb11u3bullseyepackage

Примечания

  • https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7

  • Fixed by: https://github.com/OpenPrinting/cups/commit/fd8bc2d32589d1fd91fe1c0521be2a7c0462109e

EPSS

Процентиль: 51%
0.00282
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.

CVSS3: 5.9
redhat
больше 2 лет назад

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.

CVSS3: 7.5
nvd
больше 2 лет назад

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.

CVSS3: 5.5
msrc
больше 1 года назад

Описание отсутствует

suse-cvrf
больше 2 лет назад

Security update for cups

EPSS

Процентиль: 51%
0.00282
Низкий