Out-of-bounds Write Affecting cups package, versions <2.3.3op2-3+deb11u3
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-CUPS-5663686
- published 1 Jun 2023
- disclosed 1 Jun 2023
Introduced: 1 Jun 2023
CVE-2023-32324 Open this link in a new tabHow to fix?
Upgrade Debian:11
cups
to version 2.3.3op2-3+deb11u3 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups
package and not the cups
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function format_log_line
could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file cupsd.conf
sets the value of loglevel
to DEBUG
. No known patches or workarounds exist at time of publication.