// For flags

CVE-2007-4351

cups boundary error

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Off-by-one error in the ippReadIO function in cups/ipp.c in CUPS 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted (1) textWithLanguage or (2) nameWithLanguage Internet Printing Protocol (IPP) tag, leading to a stack-based buffer overflow.

Error de superación de límite (off-by-one) en la función ippReadIO de cup/ipp.c de CUPS 1.3.3 permite a atacantes remotos provocar una denegación de servicio (caída) mediante una etiqueta (1) textWithLanguage o (2) nameWithLanguage Internet Printing Protocol (IPP) manipuladas, llevando a un desbordamiento de búfer basado en pila.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-08-14 CVE Reserved
  • 2007-10-31 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-189: Numeric Errors
CAPEC
References (42)
URL Tag Source
http://docs.info.apple.com/article.html?artnum=307179 X_refsource_confirm
http://secunia.com/advisories/27410 Third Party Advisory
http://secunia.com/advisories/27445 Third Party Advisory
http://secunia.com/advisories/27447 Third Party Advisory
http://secunia.com/advisories/27474 Third Party Advisory
http://secunia.com/advisories/27494 Third Party Advisory
http://secunia.com/advisories/27499 Third Party Advisory
http://secunia.com/advisories/27540 Third Party Advisory
http://secunia.com/advisories/27577 Third Party Advisory
http://secunia.com/advisories/27604 Third Party Advisory
http://secunia.com/advisories/27712 Third Party Advisory
http://secunia.com/advisories/28136 Third Party Advisory
http://secunia.com/advisories/30847 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-476.htm X_refsource_confirm
http://www.cups.org/str.php?L2561 X_refsource_confirm
http://www.kb.cert.org/vuls/id/446897 Third Party Advisory
http://www.securityfocus.com/bid/26268 Vdb Entry
http://www.securitytracker.com/id?1018879 Vdb Entry
http://www.us-cert.gov/cas/techalerts/TA07-352A.html Third Party Advisory
http://www.vupen.com/english/advisories/2007/3681 Vdb Entry
http://www.vupen.com/english/advisories/2007/4238 Vdb Entry
http://www.vupen.com/english/advisories/2008/1934/references Vdb Entry
https://bugzilla.redhat.com/show_bug.cgi?id=361661 X_refsource_confirm
https://exchange.xforce.ibmcloud.com/vulnerabilities/38190 Vdb Entry
https://issues.rpath.com/browse/RPL-1875 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10604 Signature
URL Date SRC
URL Date SRC
http://secunia.com/advisories/27233 2018-10-03
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cups
Search vendor "Cups"
Cups
Search vendor "Cups" for product "Cups"
<= 1.3.3
Search vendor "Cups" for product "Cups" and version " <= 1.3.3"
-
Affected