6.8
CVSSv2

CVE-2008-3640

Published: 14/10/2008 Updated: 03/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the WriteProlog function in texttops in CUPS prior to 1.3.9 allows remote malicious users to execute arbitrary code via a crafted PostScript file that triggers a heap-based buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

apple cups 1.1.11

apple cups 1.1.14

apple cups 1.1.13

apple cups 1.1.16

apple cups 1.1.18

apple cups 1.1.20

apple cups 1.1.1

apple cups 1.1.10

apple cups 1.1.19

apple cups 1.1.21

apple cups 1.1.3

apple cups 1.1.4

apple cups 1.1.15

apple cups 1.1.12

apple cups 1.1.23

apple cups 1.1.22

apple cups 1.1.5

apple cups 1.2.1

apple cups 1.1.6-2

apple cups 1.1.8

apple cups 1.2.7

apple cups 1.2.8

apple cups 1.2.10

apple cups 1.2

apple cups 1.2.9

apple cups 1.3

apple cups 1.2.0

apple cups 1.1.6

apple cups 1.1.7

apple cups 1.2.5

apple cups 1.2.11

apple cups 1.2.12

apple cups 1.3.0

apple cups 1.3.1

apple cups 1.3.4

apple cups 1.3.5

apple cups 1.1.9-1

apple cups 1.1.6-3

apple cups 1.2.2

apple cups 1.2.6

apple cups 1.3.6

apple cups 1.1

apple cups 1.1.10-1

apple cups 1.1.17

apple cups 1.1.2

apple cups 1.1.5-1

apple cups 1.1.5-2

apple cups 1.1.6-1

apple cups 1.1.9

apple cups 1.2.4

apple cups 1.2.3

apple cups 1.3.2

apple cups 1.3.3

apple cups 1.3.7

apple cups

Vendor Advisories

Debian Bug report logs - #506180 CVE-2008-5183: daemon crashes when adding more than 100 subscriptions Package: cups; Maintainer for cups is Debian Printing Team <debian-printing@listsdebianorg>; Source for cups is src:cups (PTS, buildd, popcon) Reported by: Raphael Geissert <atomo64@gmailcom> Date: Wed, 19 Nov 20 ...
It was discovered that the SGI image filter in CUPS did not perform proper bounds checking If a user or automated system were tricked into opening a crafted SGI image, an attacker could cause a denial of service (CVE-2008-3639) ...
Synopsis Important: cups security update Type/Severity Security Advisory: Important Topic Updated cups packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 3, 4, and 5This update has been rated as having important security impact by the RedHat Security Response Team ...
Synopsis Important: cups security update Type/Severity Security Advisory: Important Topic Updated cups packages that fix a security issue are now available for RedHat Enterprise Linux 3This update has been rated as having important security impact by the RedHat Security Response Team Description ...

References

CWE-189http://www.cups.org/articles.php?L575http://www.cups.org/str.php?L2919http://secunia.com/advisories/32084http://www.mandriva.com/security/advisories?name=MDVSA-2008:211http://www.securityfocus.com/bid/31690http://www.securitytracker.com/id?1021034http://secunia.com/advisories/32226http://www.redhat.com/support/errata/RHSA-2008-0937.htmlhttp://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.htmlhttp://secunia.com/advisories/32316http://secunia.com/advisories/32292https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00380.htmlhttps://www.redhat.com/archives/fedora-package-announce/2008-October/msg00331.htmlhttp://secunia.com/advisories/32284http://www.gentoo.org/security/en/glsa/glsa-200812-11.xmlhttp://www.debian.org/security/2008/dsa-1656http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=752http://support.avaya.com/elmodocs2/security/ASA-2008-470.htmhttp://secunia.com/advisories/33111http://secunia.com/advisories/33085http://sunsolve.sun.com/search/document.do?assetkey=1-26-261088-1http://www.vupen.com/english/advisories/2009/1568http://www.vupen.com/english/advisories/2008/3401http://www.vupen.com/english/advisories/2008/2782http://secunia.com/advisories/32331https://exchange.xforce.ibmcloud.com/vulnerabilities/45790https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10266https://usn.ubuntu.com/656-1/https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506180https://usn.ubuntu.com/656-1/https://nvd.nist.gov