Out-of-Bounds Affecting cups package, versions <1.5.0-16
Snyk CVSS
Attack Complexity
Low
Threat Intelligence
EPSS
7.31% (94th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN8-CUPS-364512
- published 14 Jul 2015
- disclosed 14 Jul 2015
Introduced: 14 Jul 2015
CVE-2015-3258 Open this link in a new tabHow to fix?
Upgrade Debian:8
cups
to version 1.5.0-16 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups
package and not the cups
package as distributed by Debian
.
See How to fix?
for Debian:8
relevant fixed versions and status.
Heap-based buffer overflow in the WriteProlog function in filter/texttopdf.c in texttopdf in cups-filters before 1.0.70 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a small line size in a print job.
References
- ADVISORY
- Debian Security Advisory
- Gentoo Security Advisory
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7363
- http://ubuntu.com/usn/usn-2659-1
- OpenSuse Security Update
- Oracle Security Bulletin
- OSS security Advisory
- RedHat Bugzilla Bug
- RedHat Security Advisory
- Security Focus
- Ubuntu CVE Tracker
- secalert@redhat.com
- secalert@redhat.com