9.3
CVSSv2

CVE-2007-5849

Published: 19/12/2007 Updated: 29/07/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) for CUPS 1.2 up to and including 1.3.4 allows remote malicious users to execute arbitrary code via a crafted SNMP response that triggers a stack-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

easy software products cups 1.2.4

easy software products cups 1.2.9

easy software products cups 1.2.10

easy software products cups 1.2.12

easy software products cups 1.3.3

Vendor Advisories

Wei Wang discovered that the SNMP discovery backend did not correctly calculate the length of strings If a user were tricked into scanning for printers, a remote attacker could send a specially crafted packet and possibly execute arbitrary code ...
Debian Bug report logs - #457453 cupsys: CVE-2007-5849 stack-based buffer overflow leading to code execution in SNMP back-end Package: cupsys; Maintainer for cupsys is (unknown); Reported by: Nico Golde <nion@debianorg> Date: Sat, 22 Dec 2007 14:33:01 UTC Severity: grave Tags: patch, security Found in versions cupsys/12 ...
Debian Bug report logs - #456960 cupsys: CVE-2007-6358 insecure file handling in pdftops filter script Package: cupsys; Maintainer for cupsys is (unknown); Reported by: Nico Golde <nion@debianorg> Date: Tue, 18 Dec 2007 18:21:04 UTC Severity: important Tags: security Fixed in version cupsys/135-1 Done: Kenshi Muto &lt ...
Several local vulnerabilities have been discovered in the Common UNIX Printing System The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-5849 Wei Wang discovered that an buffer overflow in the SNMP backend may lead to the execution of arbitrary code CVE-2007-6358 Elias Pipping ...

Exploits

source: wwwsecurityfocuscom/bid/26917/info Common UNIX Printing System (CUPS) is prone to a remote buffer-overflow vulnerability because the software fails to properly bounds-check user-supplied data before copying it to an insufficiently sized buffer Exploiting this issue allows attackers to execute arbitrary machine code in the contex ...