CUPS integer overflow CVE-2008-5286 fix available
Reporter | Title | Published | Views | Family All 70 |
---|---|---|---|---|
Cvelist | CVE-2008-5286 | 1 Dec 200815:00 | – | cvelist |
OpenVAS | Debian: Security Advisory (DSA-1677-1) | 10 Dec 200800:00 | – | openvas |
OpenVAS | RedHat Update for cups RHSA-2008:1028-01 | 6 Mar 200900:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 1677-1 (cupsys) | 10 Dec 200800:00 | – | openvas |
OpenVAS | CentOS Update for cups CESA-2008:1028 centos3 i386 | 27 Feb 200900:00 | – | openvas |
OpenVAS | CentOS Update for cups CESA-2008:1028 centos3 x86_64 | 27 Feb 200900:00 | – | openvas |
OpenVAS | CentOS Update for cups CESA-2008:1028 centos3 i386 | 27 Feb 200900:00 | – | openvas |
OpenVAS | CentOS Update for cups CESA-2008:1028 centos3 x86_64 | 27 Feb 200900:00 | – | openvas |
OpenVAS | RedHat Update for cups RHSA-2008:1028-01 | 6 Mar 200900:00 | – | openvas |
OpenVAS | SLES9: Security update for Cups | 10 Oct 200900:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 4 | i386 | cupsys-dbg | 1.2.7-4etch6 | cupsys-dbg_1.2.7-4etch6_i386.deb |
Debian | 4 | amd64 | cupsys-bsd | 1.2.7-4etch6 | cupsys-bsd_1.2.7-4etch6_amd64.deb |
Debian | 4 | hppa | cupsys | 1.2.7-4etch6 | cupsys_1.2.7-4etch6_hppa.deb |
Debian | 4 | alpha | libcupsys2-dev | 1.2.7-4etch6 | libcupsys2-dev_1.2.7-4etch6_alpha.deb |
Debian | 4 | powerpc | libcupsys2-dev | 1.2.7-4etch6 | libcupsys2-dev_1.2.7-4etch6_powerpc.deb |
Debian | 4 | alpha | libcupsimage2-dev | 1.2.7-4etch6 | libcupsimage2-dev_1.2.7-4etch6_alpha.deb |
Debian | 4 | s390 | libcupsimage2-dev | 1.2.7-4etch6 | libcupsimage2-dev_1.2.7-4etch6_s390.deb |
Debian | 4 | amd64 | cupsys-client | 1.2.7-4etch6 | cupsys-client_1.2.7-4etch6_amd64.deb |
Debian | 4 | mipsel | libcupsys2 | 1.2.7-4etch6 | libcupsys2_1.2.7-4etch6_mipsel.deb |
Debian | 4 | s390 | cupsys | 1.2.7-4etch6 | cupsys_1.2.7-4etch6_s390.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo