Lucene search

K
nvd[email protected]NVD:CVE-2013-6475
HistoryMar 14, 2014 - 3:55 p.m.

CVE-2013-6475

2014-03-1415:55:05
CWE-189
web.nvd.nist.gov

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.4 High

AI Score

Confidence

High

0.061 Low

EPSS

Percentile

93.6%

Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.

Affected configurations

NVD
Node
canonicalubuntu_linuxMatch10.04-lts
OR
canonicalubuntu_linuxMatch12.04-lts
OR
canonicalubuntu_linuxMatch12.10
OR
canonicalubuntu_linuxMatch13.10
OR
debiandebian_linux
OR
fedoraprojectfedora
Node
linuxfoundationcups-filtersRange1.0.46
OR
linuxfoundationcups-filtersMatch1.0
OR
linuxfoundationcups-filtersMatch1.0.1
OR
linuxfoundationcups-filtersMatch1.0.2
OR
linuxfoundationcups-filtersMatch1.0.3
OR
linuxfoundationcups-filtersMatch1.0.4
OR
linuxfoundationcups-filtersMatch1.0.5
OR
linuxfoundationcups-filtersMatch1.0.6
OR
linuxfoundationcups-filtersMatch1.0.7
OR
linuxfoundationcups-filtersMatch1.0.8
OR
linuxfoundationcups-filtersMatch1.0.9
OR
linuxfoundationcups-filtersMatch1.0.10
OR
linuxfoundationcups-filtersMatch1.0.11
OR
linuxfoundationcups-filtersMatch1.0.12
OR
linuxfoundationcups-filtersMatch1.0.13
OR
linuxfoundationcups-filtersMatch1.0.14
OR
linuxfoundationcups-filtersMatch1.0.15
OR
linuxfoundationcups-filtersMatch1.0.16
OR
linuxfoundationcups-filtersMatch1.0.17
OR
linuxfoundationcups-filtersMatch1.0.18
OR
linuxfoundationcups-filtersMatch1.0.19
OR
linuxfoundationcups-filtersMatch1.0.20
OR
linuxfoundationcups-filtersMatch1.0.21
OR
linuxfoundationcups-filtersMatch1.0.22
OR
linuxfoundationcups-filtersMatch1.0.23
OR
linuxfoundationcups-filtersMatch1.0.24
OR
linuxfoundationcups-filtersMatch1.0.25
OR
linuxfoundationcups-filtersMatch1.0.26
OR
linuxfoundationcups-filtersMatch1.0.27
OR
linuxfoundationcups-filtersMatch1.0.28
OR
linuxfoundationcups-filtersMatch1.0.29
OR
linuxfoundationcups-filtersMatch1.0.30
OR
linuxfoundationcups-filtersMatch1.0.31
OR
linuxfoundationcups-filtersMatch1.0.32
OR
linuxfoundationcups-filtersMatch1.0.33
OR
linuxfoundationcups-filtersMatch1.0.34
OR
linuxfoundationcups-filtersMatch1.0.35
OR
linuxfoundationcups-filtersMatch1.0.36
OR
linuxfoundationcups-filtersMatch1.0.37
OR
linuxfoundationcups-filtersMatch1.0.38
OR
linuxfoundationcups-filtersMatch1.0.39
OR
linuxfoundationcups-filtersMatch1.0.40
OR
linuxfoundationcups-filtersMatch1.0.41
OR
linuxfoundationcups-filtersMatch1.0.42
OR
linuxfoundationcups-filtersMatch1.0.43
OR
linuxfoundationcups-filtersMatch1.0.44
OR
linuxfoundationcups-filtersMatch1.0.45

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

7.4 High

AI Score

Confidence

High

0.061 Low

EPSS

Percentile

93.6%