Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2023-4504
Description:Due to failure in validating the length provided by an attacker- crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Test IDs: 1.3.6.1.4.1.25623.1.1.1.2.2023.3594   1.3.6.1.4.1.25623.1.1.2.2023.3325   1.3.6.1.4.1.25623.1.0.151040   1.3.6.1.4.1.25623.1.1.2.2023.3168   1.3.6.1.4.1.25623.1.1.13.2023.264.02   1.3.6.1.4.1.25623.1.1.12.2023.6391.1   1.3.6.1.4.1.25623.1.0.884877   1.3.6.1.4.1.25623.1.1.2.2023.3492   1.3.6.1.4.1.25623.1.0.884893   1.3.6.1.4.1.25623.1.0.884970   1.3.6.1.4.1.25623.1.1.12.2023.6391.2   1.3.6.1.4.1.25623.1.1.2.2023.3464   1.3.6.1.4.1.25623.1.0.884870   1.3.6.1.4.1.25623.1.1.2.2024.1676   1.3.6.1.4.1.25623.1.1.2.2024.1004   1.3.6.1.4.1.25623.1.1.2.2023.3203   1.3.6.1.4.1.25623.1.1.2.2024.1646   1.3.6.1.4.1.25623.1.1.12.2023.6392.1   1.3.6.1.4.1.25623.1.1.2.2023.3266   1.3.6.1.4.1.25623.1.1.2.2024.1259   1.3.6.1.4.1.25623.1.0.884876   1.3.6.1.4.1.25623.1.1.2.2024.1135   1.3.6.1.4.1.25623.1.1.2.2023.3293   1.3.6.1.4.1.25623.1.1.2.2024.1030   1.3.6.1.4.1.25623.1.1.2.2023.3238  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2023-4504
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WVS4I7JG3LISFPKTM6ADKJXXEPEEWBQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMYDKIE4PSJDEMC5OWNFCDMHFGLJ57XG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2GSPQAFK2Z6L57TRXEKZDF42K2EVBH7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXPVADB56NMLJWG4IZ3OZBNJ2ZOLPQJ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5WHEJIYMMAIXU2EC35MGTB5LGGO2FFJE/
https://github.com/OpenPrinting/cups/releases/tag/v2.4.7
https://github.com/OpenPrinting/cups/releases/tag/v2.4.7
https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h
https://github.com/OpenPrinting/cups/security/advisories/GHSA-pf5r-86w9-678h
https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6
https://github.com/OpenPrinting/libppd/security/advisories/GHSA-4f65-6ph5-qwh6
https://takeonme.org/cves/CVE-2023-4504.html
https://takeonme.org/cves/CVE-2023-4504.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00041.html




© 1998-2025 E-Soft Inc. All rights reserved.