Описание
jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2002-1369
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10910
- http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000702
- http://marc.info/?l=bugtraq&m=104032149026670&w=2
- http://www.debian.org/security/2003/dsa-232
- http://www.idefense.com/advisory/12.19.02.txt
- http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001
- http://www.novell.com/linux/security/advisories/2003_002_cups.html
- http://www.redhat.com/support/errata/RHSA-2002-295.html
- http://www.securityfocus.com/bid/6438
EPSS
CVE ID
Связанные уязвимости
jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 doe ...
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS