Out-of-Bounds Affecting cups package, versions <1.7.5-11
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Threat Intelligence
EPSS
1.86% (89th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-CUPS-364381
- published 19 Feb 2015
- disclosed 19 Feb 2015
Introduced: 19 Feb 2015
CVE-2014-9679 Open this link in a new tabHow to fix?
Upgrade Debian:10
cups
to version 1.7.5-11 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups
package and not the cups
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
Integer underflow in the cupsRasterReadPixels function in filter/raster.c in CUPS before 2.0.2 allows remote attackers to have unspecified impact via a malformed compressed raster file, which triggers a buffer overflow.
References
- https://security-tracker.debian.org/tracker/CVE-2014-9679
- http://advisories.mageia.org/MGASA-2015-0067.html
- https://www.cups.org/str.php?L4551
- http://www.debian.org/security/2015/dsa-3172
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150171.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-February/150177.html
- https://security.gentoo.org/glsa/201607-06
- http://lists.opensuse.org/opensuse-updates/2015-02/msg00098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.openwall.com/lists/oss-security/2015/02/10/15
- http://www.openwall.com/lists/oss-security/2015/02/12/12
- http://rhn.redhat.com/errata/RHSA-2015-1123.html
- http://www.securityfocus.com/bid/72594
- http://www.securitytracker.com/id/1031776
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2014-9679
- http://www.ubuntu.com/usn/USN-2520-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:049
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:108