Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-32324

Опубликовано: 01 июн. 2023
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.5

Описание

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function format_log_line could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file cupsd.conf sets the value of loglevel to DEBUG. No known patches or workarounds exist at time of publication.

РелизСтатусПримечание
bionic

released

2.2.7-1ubuntu2.10
devel

released

2.4.2-3ubuntu3
esm-infra/bionic

released

2.2.7-1ubuntu2.10
esm-infra/focal

released

2.3.1-9ubuntu1.3
esm-infra/xenial

released

2.1.3-4ubuntu0.11+esm2
focal

released

2.3.1-9ubuntu1.3
jammy

released

2.4.1op1-1ubuntu4.2
kinetic

released

2.4.2-1ubuntu2.1
lunar

released

2.4.2-3ubuntu2.1
trusty

ignored

end of standard support

Показывать по

EPSS

Процентиль: 51%
0.00282
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
больше 2 лет назад

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.

CVSS3: 7.5
nvd
больше 2 лет назад

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.

CVSS3: 5.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 7.5
debian
больше 2 лет назад

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 ...

suse-cvrf
больше 2 лет назад

Security update for cups

EPSS

Процентиль: 51%
0.00282
Низкий

7.5 High

CVSS3