Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun.
Link | Tags |
---|---|
http://secunia.com/advisories/7858 | third party advisory |
http://secunia.com/advisories/7843 | third party advisory |
http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html | mailing list |
http://secunia.com/advisories/9325/ | third party advisory |
ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-004.0.txt | vendor advisory |
http://secunia.com/advisories/7756/ | third party advisory |
http://secunia.com/advisories/7907 | third party advisory |
http://secunia.com/advisories/7913/ | third party advisory |
http://secunia.com/advisories/7794 | third party advisory |
http://www.novell.com/linux/security/advisories/2003_002_cups.html | vendor advisory |
http://www.idefense.com/advisory/12.19.02.txt | exploit vendor advisory |
http://www.redhat.com/support/errata/RHSA-2002-295.html | patch vendor advisory |
http://secunia.com/advisories/7803 | third party advisory |
http://secunia.com/advisories/8080/ | third party advisory |
http://marc.info/?l=bugtraq&m=104032149026670&w=2 | mailing list |