Логотип exploitDog
bind:"CVE-2023-32324" OR bind:"CVE-2023-34241"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-32324" OR bind:"CVE-2023-34241"

Количество 18

Количество 18

oracle-oval логотип

ELSA-2023-7165

почти 2 года назад

ELSA-2023-7165: cups security and bug fix update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-6596

почти 2 года назад

ELSA-2023-6596: cups security and bug fix update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2023-34241

около 2 лет назад

OpenPrinting CUPS is a standards-based, open source printing system for Linux and other Unix-like operating systems. Starting in version 2.0.0 and prior to version 2.4.6, CUPS logs data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data right before. This is a use-after-free bug that impacts the entire cupsd process. The exact cause of this issue is the function `httpClose(con->http)` being called in `scheduler/client.c`. The problem is that httpClose always, provided its argument is not null, frees the pointer at the end of the call, only for cupsdLogClient to pass the pointer to httpGetHostname. This issue happens in function `cupsdAcceptClient` if LogLevel is warn or higher and in two scenarios: there is a double-lookup for the IP Address (HostNameLookups Double is set in `cupsd.conf`) which fails to resolve, or if CUPS is compiled with TCP wrappers and the connection is refused by rules from `/etc/hosts.allow` and `/et...

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2023-34241

около 2 лет назад

OpenPrinting CUPS is a standards-based, open source printing system for Linux and other Unix-like operating systems. Starting in version 2.0.0 and prior to version 2.4.6, CUPS logs data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data right before. This is a use-after-free bug that impacts the entire cupsd process. The exact cause of this issue is the function `httpClose(con->http)` being called in `scheduler/client.c`. The problem is that httpClose always, provided its argument is not null, frees the pointer at the end of the call, only for cupsdLogClient to pass the pointer to httpGetHostname. This issue happens in function `cupsdAcceptClient` if LogLevel is warn or higher and in two scenarios: there is a double-lookup for the IP Address (HostNameLookups Double is set in `cupsd.conf`) which fails to resolve, or if CUPS is compiled with TCP wrappers and the connection is refused by rules from `/etc/hosts.allow` and `/et...

CVSS3: 7.1
EPSS: Низкий
nvd логотип

CVE-2023-34241

около 2 лет назад

OpenPrinting CUPS is a standards-based, open source printing system for Linux and other Unix-like operating systems. Starting in version 2.0.0 and prior to version 2.4.6, CUPS logs data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data right before. This is a use-after-free bug that impacts the entire cupsd process. The exact cause of this issue is the function `httpClose(con->http)` being called in `scheduler/client.c`. The problem is that httpClose always, provided its argument is not null, frees the pointer at the end of the call, only for cupsdLogClient to pass the pointer to httpGetHostname. This issue happens in function `cupsdAcceptClient` if LogLevel is warn or higher and in two scenarios: there is a double-lookup for the IP Address (HostNameLookups Double is set in `cupsd.conf`) which fails to resolve, or if CUPS is compiled with TCP wrappers and the connection is refused by rules from `/etc/hosts.allow` and `/etc/

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2023-34241

больше 1 года назад

CVSS3: 7.1
EPSS: Низкий
debian логотип

CVE-2023-34241

около 2 лет назад

OpenPrinting CUPS is a standards-based, open source printing system fo ...

CVSS3: 5.3
EPSS: Низкий
ubuntu логотип

CVE-2023-32324

больше 2 лет назад

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2023-32324

больше 2 лет назад

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.

CVSS3: 5.9
EPSS: Низкий
nvd логотип

CVE-2023-32324

больше 2 лет назад

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2023-32324

больше 1 года назад

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2023-32324

больше 2 лет назад

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2616-1

около 2 лет назад

Security update for cups

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2347-1

больше 2 лет назад

Security update for cups

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2346-1

больше 2 лет назад

Security update for cups

EPSS: Низкий
fstec логотип

BDU:2023-03873

больше 2 лет назад

Уязвимость функции format_log_line() сервера печати CUPS, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2023-03719

около 2 лет назад

Уязвимость функции httpClose(con->http) сервера печати CUPS, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.1
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3706-1

почти 2 года назад

Security update for cups

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2023-7165

ELSA-2023-7165: cups security and bug fix update (MODERATE)

почти 2 года назад
oracle-oval логотип
ELSA-2023-6596

ELSA-2023-6596: cups security and bug fix update (MODERATE)

почти 2 года назад
ubuntu логотип
CVE-2023-34241

OpenPrinting CUPS is a standards-based, open source printing system for Linux and other Unix-like operating systems. Starting in version 2.0.0 and prior to version 2.4.6, CUPS logs data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data right before. This is a use-after-free bug that impacts the entire cupsd process. The exact cause of this issue is the function `httpClose(con->http)` being called in `scheduler/client.c`. The problem is that httpClose always, provided its argument is not null, frees the pointer at the end of the call, only for cupsdLogClient to pass the pointer to httpGetHostname. This issue happens in function `cupsdAcceptClient` if LogLevel is warn or higher and in two scenarios: there is a double-lookup for the IP Address (HostNameLookups Double is set in `cupsd.conf`) which fails to resolve, or if CUPS is compiled with TCP wrappers and the connection is refused by rules from `/etc/hosts.allow` and `/et...

CVSS3: 5.3
0%
Низкий
около 2 лет назад
redhat логотип
CVE-2023-34241

OpenPrinting CUPS is a standards-based, open source printing system for Linux and other Unix-like operating systems. Starting in version 2.0.0 and prior to version 2.4.6, CUPS logs data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data right before. This is a use-after-free bug that impacts the entire cupsd process. The exact cause of this issue is the function `httpClose(con->http)` being called in `scheduler/client.c`. The problem is that httpClose always, provided its argument is not null, frees the pointer at the end of the call, only for cupsdLogClient to pass the pointer to httpGetHostname. This issue happens in function `cupsdAcceptClient` if LogLevel is warn or higher and in two scenarios: there is a double-lookup for the IP Address (HostNameLookups Double is set in `cupsd.conf`) which fails to resolve, or if CUPS is compiled with TCP wrappers and the connection is refused by rules from `/etc/hosts.allow` and `/et...

CVSS3: 7.1
0%
Низкий
около 2 лет назад
nvd логотип
CVE-2023-34241

OpenPrinting CUPS is a standards-based, open source printing system for Linux and other Unix-like operating systems. Starting in version 2.0.0 and prior to version 2.4.6, CUPS logs data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data right before. This is a use-after-free bug that impacts the entire cupsd process. The exact cause of this issue is the function `httpClose(con->http)` being called in `scheduler/client.c`. The problem is that httpClose always, provided its argument is not null, frees the pointer at the end of the call, only for cupsdLogClient to pass the pointer to httpGetHostname. This issue happens in function `cupsdAcceptClient` if LogLevel is warn or higher and in two scenarios: there is a double-lookup for the IP Address (HostNameLookups Double is set in `cupsd.conf`) which fails to resolve, or if CUPS is compiled with TCP wrappers and the connection is refused by rules from `/etc/hosts.allow` and `/etc/

CVSS3: 5.3
0%
Низкий
около 2 лет назад
msrc логотип
CVSS3: 7.1
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-34241

OpenPrinting CUPS is a standards-based, open source printing system fo ...

CVSS3: 5.3
0%
Низкий
около 2 лет назад
ubuntu логотип
CVE-2023-32324

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-32324

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.

CVSS3: 5.9
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-32324

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 5.5
0%
Низкий
больше 1 года назад
debian логотип
CVE-2023-32324

OpenPrinting CUPS is an open source printing system. In versions 2.4.2 ...

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2616-1

Security update for cups

0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2347-1

Security update for cups

0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2346-1

Security update for cups

0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-03873

Уязвимость функции format_log_line() сервера печати CUPS, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-03719

Уязвимость функции httpClose(con->http) сервера печати CUPS, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.1
0%
Низкий
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:3706-1

Security update for cups

почти 2 года назад

Уязвимостей на страницу