Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-64503

Опубликовано: 12 нояб. 2025
Источник: redhat
CVSS3: 4
EPSS Низкий

Описание

cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large MediaBox value, an attacker can cause CUPS-Filter 1.x’s pdftoraster tool to write beyond the bounds of an array. First, a PDF with a large MediaBox width value causes header.cupsWidth to become large. Next, the calculation of bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8 overflows, resulting in a small value. Then, lineBuf is allocated with the small bytesPerLine size. Finally, convertLineChunked calls writePixel8, which attempts to write to lineBuf outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same bytesPerLine multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18.

A flaw was found in cups-filters. This vulnerability allows an out-of-bounds write via a crafted Portable Document Format (PDF) file with a large MediaBox value.

Отчет

This vulnerability is rated Moderate for Red Hat Enterprise Linux because a specially crafted PDF file, when processed by the cups-filters pdftoraster tool, can lead to an out-of-bounds write, potentially causing a denial of service. This affects Red Hat Enterprise Linux 7, 8, 9, and 10, as well as Fedora.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10cups-filtersFix deferred
Red Hat Enterprise Linux 7cups-filtersFix deferred
Red Hat Enterprise Linux 8cups-filtersFix deferred
Red Hat Enterprise Linux 9cups-filtersFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=2414705cups: cups-filters: cups-filters: Out-of-bounds write via crafted PDF MediaBox

EPSS

Процентиль: 15%
0.00048
Низкий

4 Medium

CVSS3

Связанные уязвимости

CVSS3: 4
ubuntu
5 месяцев назад

cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x’s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c...

CVSS3: 4
nvd
5 месяцев назад

cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x’s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c597

CVSS3: 4
debian
5 месяцев назад

cups-filters contains backends, filters, and other software required t ...

CVSS3: 4
fstec
5 месяцев назад

Уязвимость пакета для печати CUPS Filters и библиотеки для сервера печати Libcupsfilters, позволяющая нарушителю вызвать отказ в обслуживании

suse-cvrf
4 месяца назад

Security update for cups-filters

EPSS

Процентиль: 15%
0.00048
Низкий

4 Medium

CVSS3