Page 7 of 36 results (0.003 seconds)

CVSS: 10.0EPSS: 7%CPEs: 15EXPL: 1

Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun. Múltiples desbordamientos de enteros en Common Unix Printing System (CUPS) 1.1.14 a 1.1.17 permiten a atacantes remotos ejecutar código arbitrario mediante el interfaz HTTP CUPSd, como ha sido demostrado por vanilla-coke, y el código de manejo de imágenes en filtros CUPS, como ha sido demostrado por mksum • ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-004.0.txt http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html http://marc.info/?l=bugtraq&m=104032149026670&w=2 http://secunia.com/advisories/7756 http://secunia.com/advisories/7794 http://secunia.com/advisories/7803 http://secunia.com/advisories/7843 http://secunia.com/advisories/7858 http://secunia.com/advisories/7907 http://secunia.com/advisories/7913 http://secunia.com/advisories/8080 http:/ •

CVSS: 7.5EPSS: 20%CPEs: 15EXPL: 2

Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing negative arguments to be fed into memcpy() calls via HTTP requests with (1) a negative Content-Length value or (2) a negative length in a chunked transfer encoding. • https://www.exploit-db.com/exploits/22106 ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-004.0.txt http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000702 http://marc.info/?l=bugtraq&m=104032149026670&w=2 http://secunia.com/advisories/7756 http://secunia.com/advisories/7794 http://secunia.com/advisories/7803 http://secunia.com/advisories/7843 http://secunia.com/advisories/7858 http:/&# •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Buffer overflow in ippRead function of CUPS before 1.1.14 may allow attackers to execute arbitrary code via long attribute names or language values. El desbordamiento del búfer en la función ippRead de CUPS anteriores a la 1.1.14 podrían permitir a atacantes ejecutar código arbitrario mediante valores largos en los atributos 'names' o 'language'. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-008.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000471 http://lists2.suse.com/archive/suse-security-announce/2001-Mar/0000.html http://www.cups.org/relnotes.html http://www.debian.org/security/2002/dsa-110 http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-015.php http://www.redhat.com/support/errata/RHSA-2002-032.html http://www.securityfocus.com/bid/4100 https://exchange.xforce.ib •

CVSS: 1.2EPSS: 0%CPEs: 1EXPL: 0

Linux CUPS before 1.1.6 does not securely handle temporary files, possibly due to a symlink vulnerability that could allow local users to overwrite files. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000384 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000386 http://lists2.suse.com/archive/suse-security-announce/2001-Mar/0000.html http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-048.php3 •

CVSS: 7.5EPSS: 6%CPEs: 1EXPL: 0

Buffer overflows in Linux CUPS before 1.1.6 may allow remote attackers to execute arbitrary code. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000384 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000386 http://lists2.suse.com/archive/suse-security-announce/2001-Mar/0000.html http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-048.php3 •