Lucene search

K
ubuntuUbuntuUSN-606-1
HistoryMay 05, 2008 - 12:00 a.m.

CUPS vulnerability

2008-05-0500:00:00
ubuntu.com
33

7.2 High

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.015 Low

EPSS

Percentile

86.6%

Releases

  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.06

Packages

  • cupsys -

Details

Thomas Pollet discovered that CUPS did not properly validate the size of
PNG images. A local attacker, and a remote attacker if printer sharing
is enabled, could send a crafted file and cause a denial of service or
possibly execute arbitrary code as the non-root user in Ubuntu 6.06 LTS
and 7.04. In Ubuntu 7.10, attackers would be isolated by the AppArmor
CUPS profile. (CVE-2008-1722)

OSVersionArchitecturePackageVersionFilename
Ubuntu7.10noarchcupsys<Β 1.3.2-1ubuntu7.7UNKNOWN
Ubuntu7.10noarchcupsys-bsd<Β 1.3.2-1ubuntu7.7UNKNOWN
Ubuntu7.10noarchcupsys-client<Β 1.3.2-1ubuntu7.7UNKNOWN
Ubuntu7.10noarchlibcupsimage2<Β 1.3.2-1ubuntu7.7UNKNOWN
Ubuntu7.10noarchlibcupsimage2-dev<Β 1.3.2-1ubuntu7.7UNKNOWN
Ubuntu7.10noarchlibcupsys2<Β 1.3.2-1ubuntu7.7UNKNOWN
Ubuntu7.10noarchlibcupsys2-dev<Β 1.3.2-1ubuntu7.7UNKNOWN
Ubuntu7.04noarchcupsys<Β 1.2.8-0ubuntu8.4UNKNOWN
Ubuntu7.04noarchcupsys-bsd<Β 1.2.8-0ubuntu8.4UNKNOWN
Ubuntu7.04noarchcupsys-client<Β 1.2.8-0ubuntu8.4UNKNOWN
Rows per page:
1-10 of 211

7.2 High

AI Score

Confidence

Low

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.015 Low

EPSS

Percentile

86.6%