5.1 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
0.557 Medium
EPSS
Percentile
97.6%
The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier
does not properly handle the first code word in an LZW stream, which allows
remote attackers to trigger a heap-based buffer overflow, and possibly
execute arbitrary code, via a crafted stream, a different vulnerability
than CVE-2011-2896.
Author | Note |
---|---|
mdeslaur | This also affects cups 1.5.x and isn’t fixed in 1.5.0 gimp was fixed correctly with a single commit, so doesn’t have this issue, which is an incomplete fix. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 10.04 | noarch | cups | < 1.4.3-1ubuntu1.5 | UNKNOWN |
ubuntu | 10.10 | noarch | cups | < 1.4.4-6ubuntu2.4 | UNKNOWN |
ubuntu | 11.04 | noarch | cups | < 1.4.6-5ubuntu1.4 | UNKNOWN |
ubuntu | 8.04 | noarch | cupsys | < 1.3.7-1ubuntu3.13 | UNKNOWN |
ubuntu | 18.04 | noarch | swi-prolog | < any | UNKNOWN |
ubuntu | 20.04 | noarch | swi-prolog | < any | UNKNOWN |
ubuntu | 22.04 | noarch | swi-prolog | < any | UNKNOWN |
ubuntu | 23.10 | noarch | swi-prolog | < any | UNKNOWN |
ubuntu | 16.04 | noarch | swi-prolog | < any | UNKNOWN |