6.5
CVSSv2

CVE-2019-8675

Published: 27/10/2020 Updated: 29/10/2020
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS prior to 2.2.2 allows remote malicious users to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1). (CVE-2017-18190) Stack-buffer-overflow in libcups's asn1_get_type function. (CVE-2019-8675) Stack-buffer-overflow in libcups's asn1_get_packed function. (CVE-2019-8696)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple mac os x

Vendor Advisories

Debian Bug report logs - #934957 cups: multiple security issues (including CVEified CVE-2019-8675 and CVE-2019-8696) Package: src:cups; Maintainer for src:cups is Debian Printing Team <debian-printing@listsdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 17 Aug 2019 09:39:02 UTC Severity ...
Several security issues were fixed in CUPS ...
Synopsis Low: cups security and bug fix update Type/Severity Security Advisory: Low Topic An update for cups is now available for Red Hat Enterprise Linux 8Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, which gives ...
Synopsis Low: OpenShift Container Platform 4340 security and bug fix update Type/Severity Security Advisory: Low Topic An update is now available for Red Hat OpenShift Container Platform 43Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring S ...
Synopsis Moderate: OpenShift Container Platform 461 image security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat OpenShift Container Platform 46Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability S ...
A localhostlocaldomain whitelist entry in valid_host() in scheduler/clientc in CUPS before 222 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding The localhostlocaldomain name is often resolved via a DNS server (neither the OS nor the web browser is responsib ...