Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4gx2-wfcv-mvp8

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.

Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.

EPSS

Процентиль: 91%
0.07511
Низкий

Дефекты

CWE-119

Связанные уязвимости

ubuntu
около 17 лет назад

Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.

redhat
около 17 лет назад

Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.

nvd
около 17 лет назад

Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.

debian
около 17 лет назад

Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remo ...

oracle-oval
около 17 лет назад

ELSA-2008-0192: cups security update (MODERATE)

EPSS

Процентиль: 91%
0.07511
Низкий

Дефекты

CWE-119