CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
95.0%
Alin Rad Pop discovered that CUPS did not correctly validate buffer
lengths when processing IPP tags. Remote attackers successfully
exploiting this vulnerability would gain access to the non-root CUPS user
in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be
isolated by the AppArmor CUPS profile.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 7.10 | noarch | cupsys | <Β 1.3.2-1ubuntu7.1 | UNKNOWN |
Ubuntu | 7.10 | noarch | cupsys-bsd | <Β 1.3.2-1ubuntu7.1 | UNKNOWN |
Ubuntu | 7.10 | noarch | cupsys-client | <Β 1.3.2-1ubuntu7.1 | UNKNOWN |
Ubuntu | 7.10 | noarch | libcupsimage2 | <Β 1.3.2-1ubuntu7.1 | UNKNOWN |
Ubuntu | 7.10 | noarch | libcupsimage2-dev | <Β 1.3.2-1ubuntu7.1 | UNKNOWN |
Ubuntu | 7.10 | noarch | libcupsys2 | <Β 1.3.2-1ubuntu7.1 | UNKNOWN |
Ubuntu | 7.10 | noarch | libcupsys2-dev | <Β 1.3.2-1ubuntu7.1 | UNKNOWN |
Ubuntu | 7.04 | noarch | cupsys | <Β 1.2.8-0ubuntu8.1 | UNKNOWN |
Ubuntu | 7.04 | noarch | cupsys-bsd | <Β 1.2.8-0ubuntu8.1 | UNKNOWN |
Ubuntu | 7.04 | noarch | cupsys-client | <Β 1.2.8-0ubuntu8.1 | UNKNOWN |