The well known Common Unix Printing System (CUPS) was found vulnerable to a buffer overflow in the Internet Printing Protocol (IPP) handling code. The buffer overflow could be exploited by a remote attacker as long as their IP address is allowed to connect to the CUPS server.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
openSUSE | 7.3 | ppc | cups-client | < 1.1.10-60 | cups-client-1.1.10-60.ppc.rpm |
openSUSE | 7.3 | sparc | cups-client | < 1.1.10-34 | cups-client-1.1.10-34.sparc.rpm |
openSUSE | 7.2 | i386 | cups | < 1.1.6-103 | cups-1.1.6-103.i386.rpm |
openSUSE | 7.3 | i386 | cups | < 1.1.10-81 | cups-1.1.10-81.i386.rpm |
openSUSE | 7.3 | sparc | cups | < 1.1.10-34 | cups-1.1.10-34.sparc.rpm |
openSUSE | 7.1 | sparc | cups-devel | < 1.1.6-37 | cups-devel-1.1.6-37.sparc.rpm |
openSUSE | 7.1 | ppc | cups-devel | < 1.1.6-47 | cups-devel-1.1.6-47.ppc.rpm |
openSUSE | 7.2 | i386 | cups-devel | < 1.1.6-103 | cups-devel-1.1.6-103.i386.rpm |
openSUSE | 7.1 | sparc | cups | < 1.1.6-37 | cups-1.1.6-37.sparc.rpm |
openSUSE | 7.1 | i386 | cups | < 1.1.6-102 | cups-1.1.6-102.i386.rpm |