Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://secunia.com/advisories/7858 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/7843 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html | mailing-list x_refsource_VULNWATCH x_transferred |
| http://secunia.com/advisories/9325/ | third-party-advisory x_refsource_SECUNIA x_transferred |
| ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-004.0.txt | vendor-advisory x_refsource_CALDERA x_transferred |
| http://secunia.com/advisories/7756/ | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/7907 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/7913/ | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/7794 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.novell.com/linux/security/advisories/2003_002_cups.html | vendor-advisory x_refsource_SUSE x_transferred |
| http://www.idefense.com/advisory/12.19.02.txt | x_refsource_MISC x_transferred |
| http://www.redhat.com/support/errata/RHSA-2002-295.html | vendor-advisory x_refsource_REDHAT x_transferred |
| http://secunia.com/advisories/7803 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://secunia.com/advisories/8080/ | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://marc.info/?l=bugtraq&m=104032149026670&w=2 | mailing-list x_refsource_BUGTRAQ x_transferred |