7.5
CVSSv2

CVE-2008-5286

Published: 01/12/2008 Updated: 29/09/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 up to and including 1.3.9 allows remote malicious users to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.

Vulnerable Product Search on Vulmon Subscribe to Product

apple cups 1.1.19

apple cups 1.1.20

apple cups 1.1.22

apple cups 1.1.23

apple cups 1.2.3

apple cups 1.2.4

apple cups 1.2

apple cups 1.3.5

apple cups 1.3.6

apple cups 1.1.17

apple cups 1.1.18

apple cups 1.1.21

apple cups 1.2.10

apple cups 1.2.11

apple cups 1.2.7

apple cups 1.2.8

apple cups 1.3.0

apple cups 1.3.1

apple cups 1.3

apple cups 1.2.0

apple cups 1.2.1

apple cups 1.2.5

apple cups 1.2.6

apple cups 1.3.7

apple cups 1.2.12

apple cups 1.2.2

apple cups 1.2.9

apple cups 1.3.2

apple cups 1.3.3

apple cups 1.3.4

apple cups 1.3.8

apple cups 1.3.9

Vendor Advisories

Synopsis Moderate: cups security update Type/Severity Security Advisory: Moderate Topic Updated cups packages that fix a security issue are now available for RedHat Enterprise Linux 3This update has been rated as having moderate security impact by the RedHat Security Response Team Description ...
It was discovered that CUPS didn’t properly handle adding a large number of RSS subscriptions A local user could exploit this and cause CUPS to crash, leading to a denial of service This issue only applied to Ubuntu 710, 804 LTS and 810 (CVE-2008-5183) ...
Debian Bug report logs - #506180 CVE-2008-5183: daemon crashes when adding more than 100 subscriptions Package: cups; Maintainer for cups is Debian Printing Team <debian-printing@listsdebianorg>; Source for cups is src:cups (PTS, buildd, popcon) Reported by: Raphael Geissert <atomo64@gmailcom> Date: Wed, 19 Nov 20 ...
Debian Bug report logs - #507183 cups: integer overflow via validation code in of the image size Package: cups; Maintainer for cups is Debian Printing Team <debian-printing@listsdebianorg>; Source for cups is src:cups (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Fri, 28 Nov ...
An integer overflow has been discovered in the image validation code of cupsys, the Common UNIX Printing System An attacker could trigger this bug by supplying a malicious graphic that could lead to the execution of arbitrary code For the stable distribution (etch) this problem has been fixed in version 127-4etch6 For testing distribution (len ...