Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gwr4-m5cm-8f54

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.

Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.

EPSS

Процентиль: 95%
0.17193
Средний

Дефекты

CWE-119

Связанные уязвимости

ubuntu
больше 17 лет назад

Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.

redhat
больше 17 лет назад

Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.

nvd
больше 17 лет назад

Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.

debian
больше 17 лет назад

Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS ...

oracle-oval
около 17 лет назад

ELSA-2008-0192: cups security update (MODERATE)

EPSS

Процентиль: 95%
0.17193
Средний

Дефекты

CWE-119