Page 15 of 77 results (0.009 seconds)

CVSS: 10.0EPSS: 5%CPEs: 15EXPL: 1

jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack. jobs.c en Common Unix Printing System (CUPS) 1.1.14 a 1.1.17 no utiliza adecuadamente la llamada a la función strncat cuando procesa la opción string, lo que permite a atacantes remotos la ejecución arbitraria de código mediante un ataque de desbordamiento de búfer. • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000702 http://marc.info/?l=bugtraq&m=104032149026670&w=2 http://www.debian.org/security/2003/dsa-232 http://www.idefense.com/advisory/12.19.02.txt http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001 http://www.novell.com/linux/security/advisories/2003_002_cups.html http://www.redhat.com/support/errata/RHSA-2002-295.html http:// •

CVSS: 10.0EPSS: 7%CPEs: 15EXPL: 1

Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun. Múltiples desbordamientos de enteros en Common Unix Printing System (CUPS) 1.1.14 a 1.1.17 permiten a atacantes remotos ejecutar código arbitrario mediante el interfaz HTTP CUPSd, como ha sido demostrado por vanilla-coke, y el código de manejo de imágenes en filtros CUPS, como ha sido demostrado por mksum • ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-004.0.txt http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html http://marc.info/?l=bugtraq&m=104032149026670&w=2 http://secunia.com/advisories/7756 http://secunia.com/advisories/7794 http://secunia.com/advisories/7803 http://secunia.com/advisories/7843 http://secunia.com/advisories/7858 http://secunia.com/advisories/7907 http://secunia.com/advisories/7913 http://secunia.com/advisories/8080 http:/ •

CVSS: 7.5EPSS: 20%CPEs: 15EXPL: 2

Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing negative arguments to be fed into memcpy() calls via HTTP requests with (1) a negative Content-Length value or (2) a negative length in a chunked transfer encoding. • https://www.exploit-db.com/exploits/22106 ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-004.0.txt http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000702 http://marc.info/?l=bugtraq&m=104032149026670&w=2 http://secunia.com/advisories/7756 http://secunia.com/advisories/7794 http://secunia.com/advisories/7803 http://secunia.com/advisories/7843 http://secunia.com/advisories/7858 http:/&# •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Buffer overflow in ippRead function of CUPS before 1.1.14 may allow attackers to execute arbitrary code via long attribute names or language values. El desbordamiento del búfer en la función ippRead de CUPS anteriores a la 1.1.14 podrían permitir a atacantes ejecutar código arbitrario mediante valores largos en los atributos 'names' o 'language'. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-008.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000471 http://lists2.suse.com/archive/suse-security-announce/2001-Mar/0000.html http://www.cups.org/relnotes.html http://www.debian.org/security/2002/dsa-110 http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-015.php http://www.redhat.com/support/errata/RHSA-2002-032.html http://www.securityfocus.com/bid/4100 https://exchange.xforce.ib •

CVSS: 1.2EPSS: 0%CPEs: 1EXPL: 0

Linux CUPS before 1.1.6 does not securely handle temporary files, possibly due to a symlink vulnerability that could allow local users to overwrite files. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000384 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000386 http://lists2.suse.com/archive/suse-security-announce/2001-Mar/0000.html http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-048.php3 •