Page 3 of 15 results (0.013 seconds)

CVSS: 8.3EPSS: 0%CPEs: 10EXPL: 0

cups-browsed in cups-filters 1.0.41 before 1.0.51 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the (1) model or (2) PDL, related to "System V interface scripts generated for queues." cups-browsed en cups-filters 1.0.41 anterior a 1.0.51 permite a impresoras IPP remotas ejecutar comandos arbitrarios a través de metacaracteres de shell en el (1) modelo o (2) PDL, relacionado con "scripts de interfaz System V generados para colas." • http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7188#NEWS http://lists.fedoraproject.org/pipermail/package-announce/2014-April/131485.html http://seclists.org/oss-sec/2014/q2/13 http://secunia.com/advisories/57530 http://www.ubuntu.com/usn/USN-2210-1 https://bugzilla.redhat.com/show_bug.cgi?id=1083326 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.8EPSS: 9%CPEs: 23EXPL: 0

Multiple heap-based buffer overflows in the urftopdf filter in cups-filters 1.0.25 before 1.0.47 allow remote attackers to execute arbitrary code via a large (1) page or (2) line in a URF file. Múltiples desbordamientos de buffer basado en memoria dinámica en el filtro urftopdf en cups-filters 1.0.25 anterior a 1.0.47 permiten a atacantes remotos ejecutar código arbitrario a través de una (1) página grande o (2) línea grande en un archivo URF. • http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7175 http://www.securityfocus.com/bid/66601 http://www.ubuntu.com/usn/USN-2143-1 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333 https://bugzilla.redhat.com/show_bug.cgi?id=1027547 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.4EPSS: 0%CPEs: 53EXPL: 0

The OPVPWrapper::loadDriver function in oprs/OPVPWrapper.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows local users to gain privileges via a Trojan horse driver in the same directory as the PDF file. La función OPVPWrapper::loadDriver en oprs/OPVPWrapper.cxx en el filtro pdftoopvp en CUPS y cups-filters anterior a 1.0.47 permite a usuarios locales ganar privilegios a través de un controlador caballo de troya en el mismo directorio que el archivo de PDF. • http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176 http://www.debian.org/security/2014/dsa-2875 http://www.debian.org/security/2014/dsa-2876 http://www.ubuntu.com/usn/USN-2143-1 http://www.ubuntu.com/usn/USN-2144-1 https://bugzilla.redhat.com/show_bug.cgi?id=1027551 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 11%CPEs: 53EXPL: 0

Heap-based buffer overflow in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows remote attackers to execute arbitrary code via a crafted PDF file. Desbordamiento de buffer basado en memoria dinámica en el filtro pdftoopvp en CUPS y cups-filters anterior a 1.0.47 permite a atacantes remotos ejecutar código arbitrario a través de un archivo PDF manipulado. • http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176 http://www.debian.org/security/2014/dsa-2875 http://www.debian.org/security/2014/dsa-2876 http://www.securityfocus.com/bid/66163 http://www.ubuntu.com/usn/USN-2143-1 http://www.ubuntu.com/usn/USN-2144-1 https://bugzilla.redhat.com/show_bug.cgi?id=1027548 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 6%CPEs: 53EXPL: 0

Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow. Múltiples desbordamientos de enteros en (1) OPVPOutputDev.cxx y (2) oprs/OPVPSplash.cxx en el filtro pdftoopvp en CUPS y cups-filters anterior a 1.0.47 permiten a atacantes remotos ejecutar código arbitrario a través de un archive de PDF manipulado, lo que provoca un desbordamiento de buffer basado en memoria dinámica. • http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176 http://www.debian.org/security/2014/dsa-2875 http://www.debian.org/security/2014/dsa-2876 http://www.securityfocus.com/bid/66166 http://www.ubuntu.com/usn/USN-2143-1 http://www.ubuntu.com/usn/USN-2144-1 https://bugzilla.redhat.com/show_bug.cgi?id=1027550 • CWE-189: Numeric Errors •