Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.90017
Kategorie:Buffer overflow
Titel:CUPS < 1.3.8 Multiple Vulnerabilities
Zusammenfassung:CUPS (Common UNIX Printing System) service is prone to multiple; vulnerabilities.
Beschreibung:Summary:
CUPS (Common UNIX Printing System) service is prone to multiple
vulnerabilities.

Vulnerability Insight:
The following vulnerabilities exist:

- CVE-2008-0047: Heap-based buffer overflow in the cgiCompileSearch function, when printer sharing
is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.

- CVE-2008-1722: Multiple integer overflows in (1) filter/image-png.c and (2) filter/image-zoom.c
allow attackers to cause a denial of service (crash) and trigger memory corruption, as demonstrated
via a crafted PNG image.

Affected Software/OS:
CUPS prior to version 1.3.8.

Solution:
Update to version 1.3.8 or later.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-1722
BugTraq ID: 28781
http://www.securityfocus.com/bid/28781
CERT/CC vulnerability note: VU#218395
http://www.kb.cert.org/vuls/id/218395
Debian Security Information: DSA-1625 (Google Search)
http://www.debian.org/security/2008/dsa-1625
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00081.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00068.html
http://www.gentoo.org/security/en/glsa/glsa-200804-23.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:170
http://www.osvdb.org/44398
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8768
RedHat Security Advisories: RHSA-2008:0498
https://rhn.redhat.com/errata/RHSA-2008-0498.html
http://www.securitytracker.com/id?1019854
http://secunia.com/advisories/29809
http://secunia.com/advisories/29902
http://secunia.com/advisories/30078
http://secunia.com/advisories/30190
http://secunia.com/advisories/30553
http://secunia.com/advisories/30717
http://secunia.com/advisories/31324
http://secunia.com/advisories/32292
SuSE Security Announcement: SUSE-SR:2008:013 (Google Search)
http://www.novell.com/linux/security/advisories/2008_13_sr.html
http://www.ubuntu.com/usn/usn-606-1
https://usn.ubuntu.com/656-1/
http://www.vupen.com/english/advisories/2008/1226/references
XForce ISS Database: cups-imagepng-imagezoom-bo(41832)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41832
Common Vulnerability Exposure (CVE) ID: CVE-2008-0047
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
BugTraq ID: 28307
http://www.securityfocus.com/bid/28307
Cert/CC Advisory: TA08-079A
http://www.us-cert.gov/cas/techalerts/TA08-079A.html
Debian Security Information: DSA-1530 (Google Search)
http://www.debian.org/security/2008/dsa-1530
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00091.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html
http://security.gentoo.org/glsa/glsa-200804-01.xml
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674
http://www.mandriva.com/security/advisories?name=MDVSA-2008:081
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10085
http://www.redhat.com/support/errata/RHSA-2008-0192.html
http://www.securitytracker.com/id?1019646
http://secunia.com/advisories/29420
http://secunia.com/advisories/29431
http://secunia.com/advisories/29448
http://secunia.com/advisories/29485
http://secunia.com/advisories/29573
http://secunia.com/advisories/29603
http://secunia.com/advisories/29634
http://secunia.com/advisories/29655
http://secunia.com/advisories/29750
SuSE Security Announcement: SUSE-SA:2008:015 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00005.html
http://www.ubuntu.com/usn/usn-598-1
http://www.vupen.com/english/advisories/2008/0921/references
http://www.vupen.com/english/advisories/2008/0924/references
CopyrightCopyright (C) 2008 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.