Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-0053

Опубликовано: 18 мар. 2008
Источник: redhat
CVSS2: 5.4
EPSS Средний

Описание

Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.

Отчет

NVD clarification: To exploit this flaw an attacker needs to print a malicious file through the vulnerable filter (either themselves or by convincing a victim to do so), it should therefore be AC:M In CUPS, print filters run as an unprivileged user no superuser (root), therefore this should be scored C:P, I:P, A:P

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=438117cups: buffer overflows in HP-GL/2 filter

EPSS

Процентиль: 95%
0.17193
Средний

5.4 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 17 лет назад

Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.

nvd
больше 17 лет назад

Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.

debian
больше 17 лет назад

Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS ...

github
около 3 лет назад

Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.

oracle-oval
около 17 лет назад

ELSA-2008-0192: cups security update (MODERATE)

EPSS

Процентиль: 95%
0.17193
Средний

5.4 Medium

CVSS2