Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-6475 (GCVE-0-2013-6475)
Vulnerability from cvelistv5
Published
2014-03-14 15:00
Modified
2024-08-06 17:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T17:39:01.271Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-2144-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2144-1" }, { "name": "DSA-2876", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2876" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176" }, { "name": "66166", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/66166" }, { "name": "USN-2143-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2143-1" }, { "name": "DSA-2875", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-2875" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-12-29T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-2144-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2144-1" }, { "name": "DSA-2876", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2876" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176" }, { "name": "66166", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/66166" }, { "name": "USN-2143-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2143-1" }, { "name": "DSA-2875", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2014/dsa-2875" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-6475", "datePublished": "2014-03-14T15:00:00", "dateReserved": "2013-11-04T00:00:00", "dateUpdated": "2024-08-06T17:39:01.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2013-6475\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2014-03-14T15:55:05.540\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de enteros en (1) OPVPOutputDev.cxx y (2) oprs/OPVPSplash.cxx en el filtro pdftoopvp en CUPS y cups-filters anterior a 1.0.47 permiten a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archive de PDF manipulado, lo que provoca un desbordamiento de buffer basado en memoria din\u00e1mica.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*\",\"matchCriteriaId\":\"7118F616-25CA-4E34-AA13-4D14BB62419F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*\",\"matchCriteriaId\":\"F5D324C4-97C7-49D3-A809-9EAD4B690C69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2076871-2E80-4605-A470-A41C1A8EC7EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F61F047-129C-41A6-8A27-FFCBB8563E91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C8919F1-CD33-437E-9627-69352B276BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20294CE7-12C8-43CA-A702-5ED2A3044FFC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.46\",\"matchCriteriaId\":\"96BE9065-DBB6-476F-94E4-9E1ABFE12B6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2537957-4C48-4EAE-8ABE-7007609D470E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB423F2E-D982-4E4E-8BC4-A9422EED0E53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79EE8950-8167-40C5-B590-D7E7D8CE8684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"845FC6CC-0419-4E2C-89E9-2E3B4E862DF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3D38380-F381-4C30-9997-5B0AF4E90084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C007E84B-0215-41DA-90C6-A7AD13CEC2F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31A82F3D-2F83-4C01-AF26-4F3D92B56F50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08737A6-1CCA-435C-9A73-1ECD28F4B38A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED2C7719-DC78-4D79-B98F-6E9012059D8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBBAD866-D5D9-4CB9-8ED0-DF308A5F6686\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"549FDAD0-C44C-420E-8482-E4C1CF1AC806\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24595CDE-84CD-4E7F-B583-3A95CD739EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77FC9AB9-1C09-41E3-BCDD-420F0EFDFB9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57D9EF6E-464B-49AE-B3B9-E6A18C97D44B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2148B414-A59B-4C4E-8274-308D77E67BFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B8E1B50-FD96-4DF1-9DD3-A80E3BC8A9DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A4FFF7B-FB25-4CAD-A836-E003F1D8FFBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30C5C5FF-FD58-4068-AD29-4E0B6B9453C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B179FE0-A32B-4BB5-8B94-837B31097AAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EF65925-90E3-4D80-A768-9F1A232FF6C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D41125E-5173-4942-AD13-A1E89F966C38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E33FB77-5E09-424B-89CD-B58F1C3E443E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63529640-E326-4BAE-81B8-A1DDB7212944\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59F87B81-6EC5-40C2-9506-519F91DAF7F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC988F76-C53C-4AE8-AFF2-1ADFA55E4D91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C771DD-9569-4688-BA5F-D292D81E2FF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29F35F4F-86BB-42E6-B5DA-610266232C61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63CD4E64-D224-4BD6-B6B8-7FEABCC6A345\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9388F6C-59C2-49DE-8FF7-68AA6033AECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE35CE5-81F1-450E-8F14-D0967C9B01BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9771D47-3F6E-441A-BB32-C1F0D022B10A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A054DB2-3CE6-4E05-8D1B-000ABF6635A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9C1C1B0-E520-44EA-8CE6-BD111EF7F885\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7408F05-425B-4824-86EE-B54B51457573\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F10EC538-4671-4583-A70D-BD2A0B653546\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29F97CA8-BF93-4A54-A96F-3AD097CB74A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33EE31E7-A845-479F-A765-237824CB79C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A1FB206-A3E3-443C-B82E-9DDE33BD533D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83CFEE4A-A07F-4B13-8D94-FEDC709F51D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3159BD60-433B-4409-B4B6-BDEC8542B218\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D10B33C-077A-4055-B47B-13115A05F0DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BF5B05C-7C56-4FB1-821D-5A919E56C823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68650F82-F655-4008-85EF-E86C02D9944D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23CA8354-40A7-4E01-AA8A-8200A34EA2BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26EA706E-DE8C-404F-BE45-99E0E8C1D0BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC53B1B4-00F9-48B3-903F-D49F1E66668D\"}]}]}],\"references\":[{\"url\":\"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2875\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2876\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/66166\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2143-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2144-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1027550\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-2875\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2014/dsa-2876\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/66166\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2143-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2144-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1027550\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
fkie_cve-2013-6475
Vulnerability from fkie_nvd
Published
2014-03-14 15:55
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "matchCriteriaId": "7118F616-25CA-4E34-AA13-4D14BB62419F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "matchCriteriaId": "7F61F047-129C-41A6-8A27-FFCBB8563E91", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C8919F1-CD33-437E-9627-69352B276BA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:*", "matchCriteriaId": "20294CE7-12C8-43CA-A702-5ED2A3044FFC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*", "matchCriteriaId": "96BE9065-DBB6-476F-94E4-9E1ABFE12B6C", "versionEndIncluding": "1.0.46", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2537957-4C48-4EAE-8ABE-7007609D470E", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB423F2E-D982-4E4E-8BC4-A9422EED0E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "79EE8950-8167-40C5-B590-D7E7D8CE8684", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "845FC6CC-0419-4E2C-89E9-2E3B4E862DF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "F3D38380-F381-4C30-9997-5B0AF4E90084", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C007E84B-0215-41DA-90C6-A7AD13CEC2F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "31A82F3D-2F83-4C01-AF26-4F3D92B56F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "D08737A6-1CCA-435C-9A73-1ECD28F4B38A", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "ED2C7719-DC78-4D79-B98F-6E9012059D8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "FBBAD866-D5D9-4CB9-8ED0-DF308A5F6686", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "549FDAD0-C44C-420E-8482-E4C1CF1AC806", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "24595CDE-84CD-4E7F-B583-3A95CD739EEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "77FC9AB9-1C09-41E3-BCDD-420F0EFDFB9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "57D9EF6E-464B-49AE-B3B9-E6A18C97D44B", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "2148B414-A59B-4C4E-8274-308D77E67BFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "0B8E1B50-FD96-4DF1-9DD3-A80E3BC8A9DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "7A4FFF7B-FB25-4CAD-A836-E003F1D8FFBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "30C5C5FF-FD58-4068-AD29-4E0B6B9453C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "6B179FE0-A32B-4BB5-8B94-837B31097AAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "4EF65925-90E3-4D80-A768-9F1A232FF6C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "9D41125E-5173-4942-AD13-A1E89F966C38", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "6E33FB77-5E09-424B-89CD-B58F1C3E443E", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "63529640-E326-4BAE-81B8-A1DDB7212944", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "59F87B81-6EC5-40C2-9506-519F91DAF7F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "FC988F76-C53C-4AE8-AFF2-1ADFA55E4D91", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "62C771DD-9569-4688-BA5F-D292D81E2FF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "29F35F4F-86BB-42E6-B5DA-610266232C61", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "63CD4E64-D224-4BD6-B6B8-7FEABCC6A345", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "C9388F6C-59C2-49DE-8FF7-68AA6033AECD", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "EBE35CE5-81F1-450E-8F14-D0967C9B01BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "A9771D47-3F6E-441A-BB32-C1F0D022B10A", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "0A054DB2-3CE6-4E05-8D1B-000ABF6635A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "D9C1C1B0-E520-44EA-8CE6-BD111EF7F885", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "B7408F05-425B-4824-86EE-B54B51457573", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.34:*:*:*:*:*:*:*", "matchCriteriaId": "F10EC538-4671-4583-A70D-BD2A0B653546", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "29F97CA8-BF93-4A54-A96F-3AD097CB74A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "33EE31E7-A845-479F-A765-237824CB79C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "2A1FB206-A3E3-443C-B82E-9DDE33BD533D", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "83CFEE4A-A07F-4B13-8D94-FEDC709F51D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.39:*:*:*:*:*:*:*", "matchCriteriaId": "3159BD60-433B-4409-B4B6-BDEC8542B218", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.40:*:*:*:*:*:*:*", "matchCriteriaId": "4D10B33C-077A-4055-B47B-13115A05F0DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "3BF5B05C-7C56-4FB1-821D-5A919E56C823", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "68650F82-F655-4008-85EF-E86C02D9944D", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*", "matchCriteriaId": "23CA8354-40A7-4E01-AA8A-8200A34EA2BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "26EA706E-DE8C-404F-BE45-99E0E8C1D0BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "BC53B1B4-00F9-48B3-903F-D49F1E66668D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de enteros en (1) OPVPOutputDev.cxx y (2) oprs/OPVPSplash.cxx en el filtro pdftoopvp en CUPS y cups-filters anterior a 1.0.47 permiten a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archive de PDF manipulado, lo que provoca un desbordamiento de buffer basado en memoria din\u00e1mica." } ], "id": "CVE-2013-6475", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-03-14T15:55:05.540", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-2875" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2014/dsa-2876" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/66166" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2143-1" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-2144-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2014/dsa-2876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/66166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2143-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-2144-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2013-6475
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2013-6475", "description": "Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.", "id": "GSD-2013-6475", "references": [ "https://www.suse.com/security/cve/CVE-2013-6475.html", "https://www.debian.org/security/2014/dsa-2875", "https://www.debian.org/security/2014/dsa-2876", "https://advisories.mageia.org/CVE-2013-6475.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2013-6475" ], "details": "Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.", "id": "GSD-2013-6475", "modified": "2023-12-13T01:22:19.542529Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6475", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176", "refsource": "MISC", "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176" }, { "name": "http://www.debian.org/security/2014/dsa-2875", "refsource": "MISC", "url": "http://www.debian.org/security/2014/dsa-2875" }, { "name": "http://www.debian.org/security/2014/dsa-2876", "refsource": "MISC", "url": "http://www.debian.org/security/2014/dsa-2876" }, { "name": "http://www.ubuntu.com/usn/USN-2143-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-2143-1" }, { "name": "http://www.ubuntu.com/usn/USN-2144-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-2144-1" }, { "name": "http://www.securityfocus.com/bid/66166", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/66166" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.33:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.0.46", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:cups-filters:1.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-6475" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-189" } ] } ] }, "references": { "reference_data": [ { "name": "USN-2143-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2143-1" }, { "name": "DSA-2875", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2014/dsa-2875" }, { "name": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176" }, { "name": "USN-2144-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/USN-2144-1" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550" }, { "name": "DSA-2876", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2014/dsa-2876" }, { "name": "66166", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/66166" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2016-12-31T02:59Z", "publishedDate": "2014-03-14T15:55Z" } } }
ghsa-2j38-xhmg-c3g9
Vulnerability from github
Published
2022-05-17 03:12
Modified
2022-05-17 03:12
VLAI Severity ?
Details
Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.
{ "affected": [], "aliases": [ "CVE-2013-6475" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-03-14T15:55:00Z", "severity": "MODERATE" }, "details": "Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.", "id": "GHSA-2j38-xhmg-c3g9", "modified": "2022-05-17T03:12:50Z", "published": "2022-05-17T03:12:50Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-6475" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027550" }, { "type": "WEB", "url": "http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-2875" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-2876" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/66166" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2143-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2144-1" } ], "schema_version": "1.4.0", "severity": [] }
opensuse-su-2024:10313-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
cups-filters-1.8.2-1.11 on GA media
Notes
Title of the patch
cups-filters-1.8.2-1.11 on GA media
Description of the patch
These are all security issues fixed in the cups-filters-1.8.2-1.11 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10313
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "cups-filters-1.8.2-1.11 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the cups-filters-1.8.2-1.11 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10313", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10313-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6473 page", "url": "https://www.suse.com/security/cve/CVE-2013-6473/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6474 page", "url": "https://www.suse.com/security/cve/CVE-2013-6474/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6475 page", "url": "https://www.suse.com/security/cve/CVE-2013-6475/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-6476 page", "url": "https://www.suse.com/security/cve/CVE-2013-6476/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-2707 page", "url": "https://www.suse.com/security/cve/CVE-2014-2707/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-4336 page", "url": "https://www.suse.com/security/cve/CVE-2014-4336/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-4337 page", "url": "https://www.suse.com/security/cve/CVE-2014-4337/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-4338 page", "url": "https://www.suse.com/security/cve/CVE-2014-4338/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-2265 page", "url": "https://www.suse.com/security/cve/CVE-2015-2265/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3258 page", "url": "https://www.suse.com/security/cve/CVE-2015-3258/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3279 page", "url": "https://www.suse.com/security/cve/CVE-2015-3279/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8327 page", "url": "https://www.suse.com/security/cve/CVE-2015-8327/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8560 page", "url": "https://www.suse.com/security/cve/CVE-2015-8560/" } ], "title": "cups-filters-1.8.2-1.11 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10313-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cups-filters-1.8.2-1.11.aarch64", "product": { "name": "cups-filters-1.8.2-1.11.aarch64", "product_id": "cups-filters-1.8.2-1.11.aarch64" } }, { "category": "product_version", "name": "cups-filters-cups-browsed-1.8.2-1.11.aarch64", "product": { "name": "cups-filters-cups-browsed-1.8.2-1.11.aarch64", "product_id": "cups-filters-cups-browsed-1.8.2-1.11.aarch64" } }, { "category": "product_version", "name": "cups-filters-devel-1.8.2-1.11.aarch64", "product": { "name": "cups-filters-devel-1.8.2-1.11.aarch64", "product_id": "cups-filters-devel-1.8.2-1.11.aarch64" } }, { "category": "product_version", "name": "cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "product": { "name": "cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "product_id": "cups-filters-foomatic-rip-1.8.2-1.11.aarch64" } }, { "category": "product_version", "name": "cups-filters-ghostscript-1.8.2-1.11.aarch64", "product": { "name": "cups-filters-ghostscript-1.8.2-1.11.aarch64", "product_id": "cups-filters-ghostscript-1.8.2-1.11.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "cups-filters-1.8.2-1.11.ppc64le", "product": { "name": "cups-filters-1.8.2-1.11.ppc64le", "product_id": "cups-filters-1.8.2-1.11.ppc64le" } }, { "category": "product_version", "name": "cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "product": { "name": "cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "product_id": "cups-filters-cups-browsed-1.8.2-1.11.ppc64le" } }, { "category": "product_version", "name": "cups-filters-devel-1.8.2-1.11.ppc64le", "product": { "name": "cups-filters-devel-1.8.2-1.11.ppc64le", "product_id": "cups-filters-devel-1.8.2-1.11.ppc64le" } }, { "category": "product_version", "name": "cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "product": { "name": "cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "product_id": "cups-filters-foomatic-rip-1.8.2-1.11.ppc64le" } }, { "category": "product_version", "name": "cups-filters-ghostscript-1.8.2-1.11.ppc64le", "product": { "name": "cups-filters-ghostscript-1.8.2-1.11.ppc64le", "product_id": "cups-filters-ghostscript-1.8.2-1.11.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cups-filters-1.8.2-1.11.s390x", "product": { "name": "cups-filters-1.8.2-1.11.s390x", "product_id": "cups-filters-1.8.2-1.11.s390x" } }, { "category": "product_version", "name": "cups-filters-cups-browsed-1.8.2-1.11.s390x", "product": { "name": "cups-filters-cups-browsed-1.8.2-1.11.s390x", "product_id": "cups-filters-cups-browsed-1.8.2-1.11.s390x" } }, { "category": "product_version", "name": "cups-filters-devel-1.8.2-1.11.s390x", "product": { "name": "cups-filters-devel-1.8.2-1.11.s390x", "product_id": "cups-filters-devel-1.8.2-1.11.s390x" } }, { "category": "product_version", "name": "cups-filters-foomatic-rip-1.8.2-1.11.s390x", "product": { "name": "cups-filters-foomatic-rip-1.8.2-1.11.s390x", "product_id": "cups-filters-foomatic-rip-1.8.2-1.11.s390x" } }, { "category": "product_version", "name": "cups-filters-ghostscript-1.8.2-1.11.s390x", "product": { "name": "cups-filters-ghostscript-1.8.2-1.11.s390x", "product_id": "cups-filters-ghostscript-1.8.2-1.11.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cups-filters-1.8.2-1.11.x86_64", "product": { "name": "cups-filters-1.8.2-1.11.x86_64", "product_id": "cups-filters-1.8.2-1.11.x86_64" } }, { "category": "product_version", "name": "cups-filters-cups-browsed-1.8.2-1.11.x86_64", "product": { "name": "cups-filters-cups-browsed-1.8.2-1.11.x86_64", "product_id": "cups-filters-cups-browsed-1.8.2-1.11.x86_64" } }, { "category": "product_version", "name": "cups-filters-devel-1.8.2-1.11.x86_64", "product": { "name": "cups-filters-devel-1.8.2-1.11.x86_64", "product_id": "cups-filters-devel-1.8.2-1.11.x86_64" } }, { "category": "product_version", "name": "cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "product": { "name": "cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "product_id": "cups-filters-foomatic-rip-1.8.2-1.11.x86_64" } }, { "category": "product_version", "name": "cups-filters-ghostscript-1.8.2-1.11.x86_64", "product": { "name": "cups-filters-ghostscript-1.8.2-1.11.x86_64", "product_id": "cups-filters-ghostscript-1.8.2-1.11.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-filters-1.8.2-1.11.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64" }, "product_reference": "cups-filters-1.8.2-1.11.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-1.8.2-1.11.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le" }, "product_reference": "cups-filters-1.8.2-1.11.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-1.8.2-1.11.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x" }, "product_reference": "cups-filters-1.8.2-1.11.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-1.8.2-1.11.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64" }, "product_reference": "cups-filters-1.8.2-1.11.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-cups-browsed-1.8.2-1.11.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64" }, "product_reference": "cups-filters-cups-browsed-1.8.2-1.11.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-cups-browsed-1.8.2-1.11.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le" }, "product_reference": "cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-cups-browsed-1.8.2-1.11.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x" }, "product_reference": "cups-filters-cups-browsed-1.8.2-1.11.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-cups-browsed-1.8.2-1.11.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64" }, "product_reference": "cups-filters-cups-browsed-1.8.2-1.11.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-1.8.2-1.11.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64" }, "product_reference": "cups-filters-devel-1.8.2-1.11.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-1.8.2-1.11.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le" }, "product_reference": "cups-filters-devel-1.8.2-1.11.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-1.8.2-1.11.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x" }, "product_reference": "cups-filters-devel-1.8.2-1.11.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-devel-1.8.2-1.11.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64" }, "product_reference": "cups-filters-devel-1.8.2-1.11.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-foomatic-rip-1.8.2-1.11.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64" }, "product_reference": "cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-foomatic-rip-1.8.2-1.11.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le" }, "product_reference": "cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-foomatic-rip-1.8.2-1.11.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x" }, "product_reference": "cups-filters-foomatic-rip-1.8.2-1.11.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-foomatic-rip-1.8.2-1.11.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64" }, "product_reference": "cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-ghostscript-1.8.2-1.11.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64" }, "product_reference": "cups-filters-ghostscript-1.8.2-1.11.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-ghostscript-1.8.2-1.11.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le" }, "product_reference": "cups-filters-ghostscript-1.8.2-1.11.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-ghostscript-1.8.2-1.11.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x" }, "product_reference": "cups-filters-ghostscript-1.8.2-1.11.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "cups-filters-ghostscript-1.8.2-1.11.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" }, "product_reference": "cups-filters-ghostscript-1.8.2-1.11.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-6473", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6473" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the urftopdf filter in cups-filters 1.0.25 before 1.0.47 allow remote attackers to execute arbitrary code via a large (1) page or (2) line in a URF file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6473", "url": "https://www.suse.com/security/cve/CVE-2013-6473" }, { "category": "external", "summary": "SUSE Bug 866302 for CVE-2013-6473", "url": "https://bugzilla.suse.com/866302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6473" }, { "cve": "CVE-2013-6474", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6474" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows remote attackers to execute arbitrary code via a crafted PDF file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6474", "url": "https://www.suse.com/security/cve/CVE-2013-6474" }, { "category": "external", "summary": "SUSE Bug 866302 for CVE-2013-6474", "url": "https://bugzilla.suse.com/866302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6474" }, { "cve": "CVE-2013-6475", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6475" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6475", "url": "https://www.suse.com/security/cve/CVE-2013-6475" }, { "category": "external", "summary": "SUSE Bug 866302 for CVE-2013-6475", "url": "https://bugzilla.suse.com/866302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6475" }, { "cve": "CVE-2013-6476", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-6476" } ], "notes": [ { "category": "general", "text": "The OPVPWrapper::loadDriver function in oprs/OPVPWrapper.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows local users to gain privileges via a Trojan horse driver in the same directory as the PDF file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-6476", "url": "https://www.suse.com/security/cve/CVE-2013-6476" }, { "category": "external", "summary": "SUSE Bug 866302 for CVE-2013-6476", "url": "https://bugzilla.suse.com/866302" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2013-6476" }, { "cve": "CVE-2014-2707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-2707" } ], "notes": [ { "category": "general", "text": "cups-browsed in cups-filters 1.0.41 before 1.0.51 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the (1) model or (2) PDL, related to \"System V interface scripts generated for queues.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-2707", "url": "https://www.suse.com/security/cve/CVE-2014-2707" }, { "category": "external", "summary": "SUSE Bug 871327 for CVE-2014-2707", "url": "https://bugzilla.suse.com/871327" }, { "category": "external", "summary": "SUSE Bug 883543 for CVE-2014-2707", "url": "https://bugzilla.suse.com/883543" }, { "category": "external", "summary": "SUSE Bug 921753 for CVE-2014-2707", "url": "https://bugzilla.suse.com/921753" }, { "category": "external", "summary": "SUSE Bug 937018 for CVE-2014-2707", "url": "https://bugzilla.suse.com/937018" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-2707" }, { "cve": "CVE-2014-4336", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-4336" } ], "notes": [ { "category": "general", "text": "The generate_local_queue function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the host name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-4336", "url": "https://www.suse.com/security/cve/CVE-2014-4336" }, { "category": "external", "summary": "SUSE Bug 871327 for CVE-2014-4336", "url": "https://bugzilla.suse.com/871327" }, { "category": "external", "summary": "SUSE Bug 883543 for CVE-2014-4336", "url": "https://bugzilla.suse.com/883543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-4336" }, { "cve": "CVE-2014-4337", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-4337" } ], "notes": [ { "category": "general", "text": "The process_browse_data function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted packet data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-4337", "url": "https://www.suse.com/security/cve/CVE-2014-4337" }, { "category": "external", "summary": "SUSE Bug 871327 for CVE-2014-4337", "url": "https://bugzilla.suse.com/871327" }, { "category": "external", "summary": "SUSE Bug 883543 for CVE-2014-4337", "url": "https://bugzilla.suse.com/883543" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-4337" }, { "cve": "CVE-2014-4338", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-4338" } ], "notes": [ { "category": "general", "text": "cups-browsed in cups-filters before 1.0.53 allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a malformed cups-browsed.conf BrowseAllow directive that is interpreted as granting browse access to all IP addresses.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-4338", "url": "https://www.suse.com/security/cve/CVE-2014-4338" }, { "category": "external", "summary": "SUSE Bug 871327 for CVE-2014-4338", "url": "https://bugzilla.suse.com/871327" }, { "category": "external", "summary": "SUSE Bug 883536 for CVE-2014-4338", "url": "https://bugzilla.suse.com/883536" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2014-4338" }, { "cve": "CVE-2015-2265", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-2265" } ], "notes": [ { "category": "general", "text": "The remove_bad_chars function in utils/cups-browsed.c in cups-filters before 1.0.66 allows remote IPP printers to execute arbitrary commands via consecutive shell metacharacters in the (1) model or (2) PDL. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-2265", "url": "https://www.suse.com/security/cve/CVE-2015-2265" }, { "category": "external", "summary": "SUSE Bug 921753 for CVE-2015-2265", "url": "https://bugzilla.suse.com/921753" }, { "category": "external", "summary": "SUSE Bug 937018 for CVE-2015-2265", "url": "https://bugzilla.suse.com/937018" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-2265" }, { "cve": "CVE-2015-3258", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3258" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the WriteProlog function in filter/texttopdf.c in texttopdf in cups-filters before 1.0.70 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a small line size in a print job.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3258", "url": "https://www.suse.com/security/cve/CVE-2015-3258" }, { "category": "external", "summary": "SUSE Bug 921753 for CVE-2015-3258", "url": "https://bugzilla.suse.com/921753" }, { "category": "external", "summary": "SUSE Bug 936281 for CVE-2015-3258", "url": "https://bugzilla.suse.com/936281" }, { "category": "external", "summary": "SUSE Bug 937018 for CVE-2015-3258", "url": "https://bugzilla.suse.com/937018" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-3258" }, { "cve": "CVE-2015-3279", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3279" } ], "notes": [ { "category": "general", "text": "Integer overflow in filter/texttopdf.c in texttopdf in cups-filters before 1.0.71 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted line size in a print job, which triggers a heap-based buffer overflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3279", "url": "https://www.suse.com/security/cve/CVE-2015-3279" }, { "category": "external", "summary": "SUSE Bug 921753 for CVE-2015-3279", "url": "https://bugzilla.suse.com/921753" }, { "category": "external", "summary": "SUSE Bug 936281 for CVE-2015-3279", "url": "https://bugzilla.suse.com/936281" }, { "category": "external", "summary": "SUSE Bug 937018 for CVE-2015-3279", "url": "https://bugzilla.suse.com/937018" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-3279" }, { "cve": "CVE-2015-8327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8327" } ], "notes": [ { "category": "general", "text": "Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.2.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via ` (backtick) characters in a print job.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8327", "url": "https://www.suse.com/security/cve/CVE-2015-8327" }, { "category": "external", "summary": "SUSE Bug 1027197 for CVE-2015-8327", "url": "https://bugzilla.suse.com/1027197" }, { "category": "external", "summary": "SUSE Bug 957531 for CVE-2015-8327", "url": "https://bugzilla.suse.com/957531" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8327" }, { "cve": "CVE-2015-8560", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8560" } ], "notes": [ { "category": "general", "text": "Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.4.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via a ; (semicolon) character in a print job, a different vulnerability than CVE-2015-8327.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8560", "url": "https://www.suse.com/security/cve/CVE-2015-8560" }, { "category": "external", "summary": "SUSE Bug 1027197 for CVE-2015-8560", "url": "https://bugzilla.suse.com/1027197" }, { "category": "external", "summary": "SUSE Bug 957531 for CVE-2015-8560", "url": "https://bugzilla.suse.com/957531" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-cups-browsed-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-devel-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-foomatic-rip-1.8.2-1.11.x86_64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.aarch64", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.ppc64le", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.s390x", "openSUSE Tumbleweed:cups-filters-ghostscript-1.8.2-1.11.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-8560" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…