// For flags

CVE-2007-4351

cups boundary error

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Off-by-one error in the ippReadIO function in cups/ipp.c in CUPS 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted (1) textWithLanguage or (2) nameWithLanguage Internet Printing Protocol (IPP) tag, leading to a stack-based buffer overflow.

Error de superación de límite (off-by-one) en la función ippReadIO de cup/ipp.c de CUPS 1.3.3 permite a atacantes remotos provocar una denegación de servicio (caída) mediante una etiqueta (1) textWithLanguage o (2) nameWithLanguage Internet Printing Protocol (IPP) manipuladas, llevando a un desbordamiento de búfer basado en pila.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-08-14 CVE Reserved
  • 2007-10-31 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-11-18 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-189: Numeric Errors
CAPEC
References (42)
URL Tag Source
http://docs.info.apple.com/article.html?artnum=307179 X_refsource_confirm
http://secunia.com/advisories/27410 Third Party Advisory
http://secunia.com/advisories/27445 Third Party Advisory
http://secunia.com/advisories/27447 Third Party Advisory
http://secunia.com/advisories/27474 Third Party Advisory
http://secunia.com/advisories/27494 Third Party Advisory
http://secunia.com/advisories/27499 Third Party Advisory
http://secunia.com/advisories/27540 Third Party Advisory
http://secunia.com/advisories/27577 Third Party Advisory
http://secunia.com/advisories/27604 Third Party Advisory
http://secunia.com/advisories/27712 Third Party Advisory
http://secunia.com/advisories/28136 Third Party Advisory
http://secunia.com/advisories/30847 Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-476.htm X_refsource_confirm
http://www.cups.org/str.php?L2561 X_refsource_confirm
http://www.kb.cert.org/vuls/id/446897 Third Party Advisory
http://www.securityfocus.com/bid/26268 Vdb Entry
http://www.securitytracker.com/id?1018879 Vdb Entry
http://www.us-cert.gov/cas/techalerts/TA07-352A.html Third Party Advisory
http://www.vupen.com/english/advisories/2007/3681 Vdb Entry
http://www.vupen.com/english/advisories/2007/4238 Vdb Entry
http://www.vupen.com/english/advisories/2008/1934/references Vdb Entry
https://bugzilla.redhat.com/show_bug.cgi?id=361661 X_refsource_confirm
https://exchange.xforce.ibmcloud.com/vulnerabilities/38190 Vdb Entry
https://issues.rpath.com/browse/RPL-1875 X_refsource_confirm
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10604 Signature
URL Date SRC
URL Date SRC
http://secunia.com/advisories/27233 2018-10-03
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cups
Search vendor "Cups"
Cups
Search vendor "Cups" for product "Cups"
<= 1.3.3
Search vendor "Cups" for product "Cups" and version " <= 1.3.3"
-
Affected