9.4 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.429 Medium
EPSS
Percentile
97.3%
Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) for CUPS 1.2 through 1.3.4 allows remote attackers to execute arbitrary code via a crafted SNMP response that triggers a stack-based buffer overflow.
bugs.gentoo.org/show_bug.cgi?id=201570
docs.info.apple.com/article.html?artnum=307179
lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
lists.opensuse.org/opensuse-security-announce/2008-01/msg00003.html
secunia.com/advisories/28113
secunia.com/advisories/28129
secunia.com/advisories/28136
secunia.com/advisories/28200
secunia.com/advisories/28386
secunia.com/advisories/28441
secunia.com/advisories/28636
secunia.com/advisories/28676
www.cups.org/str.php?L2589
www.debian.org/security/2007/dsa-1437
www.gentoo.org/security/en/glsa/glsa-200712-14.xml
www.mandriva.com/security/advisories?name=MDVSA-2008:036
www.novell.com/linux/security/advisories/suse_security_summary_report.html
www.securityfocus.com/bid/26910
www.securityfocus.com/bid/26917
www.ubuntu.com/usn/usn-563-1
www.us-cert.gov/cas/techalerts/TA07-352A.html
www.vupen.com/english/advisories/2007/4238
www.vupen.com/english/advisories/2007/4242
exchange.xforce.ibmcloud.com/vulnerabilities/39097
exchange.xforce.ibmcloud.com/vulnerabilities/39101
www.redhat.com/archives/fedora-package-announce/2008-January/msg00908.html