Описание
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Ссылки
- Release Notes
- ExploitVendor Advisory
- ExploitVendor Advisory
- Mailing ListThird Party Advisory
- Mailing ListRelease Notes
- Mailing ListRelease Notes
- Mailing ListRelease Notes
- Third Party Advisory
- Mailing ListRelease Notes
- Exploit
- Release Notes
- ExploitVendor Advisory
- ExploitVendor Advisory
- Mailing ListThird Party Advisory
- Mailing ListRelease Notes
- Mailing ListRelease Notes
- Mailing ListRelease Notes
- Third Party Advisory
- Mailing ListRelease Notes
- Exploit
Уязвимые конфигурации
Одно из
Одно из
EPSS
7 High
CVSS3
Дефекты
Связанные уязвимости
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Due to failure in validating the length provided by an attacker-crafte ...
Уязвимость функции scan_ps() библиотеки libppd сервера печати CUPS, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
EPSS
7 High
CVSS3