CVE-2013-6476
https://notcve.org/view.php?id=CVE-2013-6476
The OPVPWrapper::loadDriver function in oprs/OPVPWrapper.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows local users to gain privileges via a Trojan horse driver in the same directory as the PDF file. La función OPVPWrapper::loadDriver en oprs/OPVPWrapper.cxx en el filtro pdftoopvp en CUPS y cups-filters anterior a 1.0.47 permite a usuarios locales ganar privilegios a través de un controlador caballo de troya en el mismo directorio que el archivo de PDF. • http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176 http://www.debian.org/security/2014/dsa-2875 http://www.debian.org/security/2014/dsa-2876 http://www.ubuntu.com/usn/USN-2143-1 http://www.ubuntu.com/usn/USN-2144-1 https://bugzilla.redhat.com/show_bug.cgi?id=1027551 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2013-6474
https://notcve.org/view.php?id=CVE-2013-6474
Heap-based buffer overflow in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows remote attackers to execute arbitrary code via a crafted PDF file. Desbordamiento de buffer basado en memoria dinámica en el filtro pdftoopvp en CUPS y cups-filters anterior a 1.0.47 permite a atacantes remotos ejecutar código arbitrario a través de un archivo PDF manipulado. • http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176 http://www.debian.org/security/2014/dsa-2875 http://www.debian.org/security/2014/dsa-2876 http://www.securityfocus.com/bid/66163 http://www.ubuntu.com/usn/USN-2143-1 http://www.ubuntu.com/usn/USN-2144-1 https://bugzilla.redhat.com/show_bug.cgi?id=1027548 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2013-6475
https://notcve.org/view.php?id=CVE-2013-6475
Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow. Múltiples desbordamientos de enteros en (1) OPVPOutputDev.cxx y (2) oprs/OPVPSplash.cxx en el filtro pdftoopvp en CUPS y cups-filters anterior a 1.0.47 permiten a atacantes remotos ejecutar código arbitrario a través de un archive de PDF manipulado, lo que provoca un desbordamiento de buffer basado en memoria dinámica. • http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176 http://www.debian.org/security/2014/dsa-2875 http://www.debian.org/security/2014/dsa-2876 http://www.securityfocus.com/bid/66166 http://www.ubuntu.com/usn/USN-2143-1 http://www.ubuntu.com/usn/USN-2144-1 https://bugzilla.redhat.com/show_bug.cgi?id=1027550 • CWE-189: Numeric Errors •
CVE-2011-2964 – foomatic: Improper sanitization of command line option in foomatic-rip (foomatic.c)
https://notcve.org/view.php?id=CVE-2011-2964
foomaticrip.c in foomatic-rip in foomatic-filters in Foomatic 4.0.6 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file, a different vulnerability than CVE-2011-2697. foomaticrip.c en foomatic-rip en los foomatic-filters de Foomatic v4.0.6 permite a atacantes remotos ejecutar código de su elección a través de un campo *FoomaticRIPCommandLine debidamente modificado en un archivo .ppd. Se trata de una vulnerabilidad diferente a la CVE-2011-2697. • http://secunia.com/advisories/45477 http://security.gentoo.org/glsa/glsa-201203-07.xml http://www.mandriva.com/security/advisories?name=MDVSA-2011:125 http://www.openwall.com/lists/oss-security/2011/07/13/3 http://www.openwall.com/lists/oss-security/2011/07/18/3 http://www.openwall.com/lists/oss-security/2011/07/28/1 http://www.redhat.com/support/errata/RHSA-2011-1110.html http://www.ubuntu.com/usn/USN-1194-1 http://www.xerox.com/download/security/se • CWE-94: Improper Control of Generation of Code ('Code Injection') •