Lucene search

K
ubuntuUbuntuUSN-539-1
HistoryNov 06, 2007 - 12:00 a.m.

CUPS vulnerability

2007-11-0600:00:00
ubuntu.com
38

6.5 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.092 Low

EPSS

Percentile

94.6%

Releases

  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06

Packages

  • cupsys -

Details

Alin Rad Pop discovered that CUPS did not correctly validate buffer
lengths when processing IPP tags. Remote attackers successfully
exploiting this vulnerability would gain access to the non-root CUPS user
in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be
isolated by the AppArmor CUPS profile.

OSVersionArchitecturePackageVersionFilename
Ubuntu7.10noarchcupsys<Β 1.3.2-1ubuntu7.1UNKNOWN
Ubuntu7.10noarchcupsys-bsd<Β 1.3.2-1ubuntu7.1UNKNOWN
Ubuntu7.10noarchcupsys-client<Β 1.3.2-1ubuntu7.1UNKNOWN
Ubuntu7.10noarchlibcupsimage2<Β 1.3.2-1ubuntu7.1UNKNOWN
Ubuntu7.10noarchlibcupsimage2-dev<Β 1.3.2-1ubuntu7.1UNKNOWN
Ubuntu7.10noarchlibcupsys2<Β 1.3.2-1ubuntu7.1UNKNOWN
Ubuntu7.10noarchlibcupsys2-dev<Β 1.3.2-1ubuntu7.1UNKNOWN
Ubuntu7.04noarchcupsys<Β 1.2.8-0ubuntu8.1UNKNOWN
Ubuntu7.04noarchcupsys-bsd<Β 1.2.8-0ubuntu8.1UNKNOWN
Ubuntu7.04noarchcupsys-client<Β 1.2.8-0ubuntu8.1UNKNOWN
Rows per page:
1-10 of 281

6.5 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.092 Low

EPSS

Percentile

94.6%