6.5
CVSSv2

CVE-2004-1267

Published: 10/01/2005 Updated: 03/10/2018
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Buffer overflow in the ParseCommand function in hpgl-input.c in the hpgltops program for CUPS 1.1.22 allows remote malicious users to execute arbitrary code via a crafted HPGL file.

Vulnerable Product Search on Vulmon Subscribe to Product

easy software products cups 1.1.13

easy software products cups 1.1.14

easy software products cups 1.1.20

easy software products cups 1.1.21

easy software products cups 1.1.10

easy software products cups 1.1.12

easy software products cups 1.1.19

easy software products cups 1.1.19_rc5

easy software products cups 1.1.6

easy software products cups 1.1.7

easy software products cups 1.0.4_8

easy software products cups 1.1.1

easy software products cups 1.1.17

easy software products cups 1.1.18

easy software products cups 1.1.4_3

easy software products cups 1.1.4_5

easy software products cups 1.0.4

easy software products cups 1.1.15

easy software products cups 1.1.16

easy software products cups 1.1.22_rc1

easy software products cups 1.1.4

easy software products cups 1.1.4_2

redhat fedora core core_2.0

redhat fedora core core_3.0

Vendor Advisories

Synopsis cups security update Type/Severity Security Advisory: Important Topic Updated CUPS packages that fix several security issues are now available Description The Common UNIX Printing System provides a portable printing layer forUNIX(R) operating systemsA buffer overflow was found in ...
Synopsis CUPS security update Type/Severity Security Advisory: Important Topic Updated CUPS packages that fix several security issues are now availableThis update has been rated as having important security impact by the Red HatSecurity Response Team Description The Common UNIX Printing S ...

Exploits

source: wwwsecurityfocuscom/bid/11968/info CUPS is reported prone to a remote buffer overflow vulnerability The issue is reported to exist in the 'hpgl-inputc' source file and is because of a lack of sufficient boundary checks performed on data contained in HPGL files A remote attacker may exploit this condition to execute arbitrary c ...