5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
28.9%
OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and
prior, a heap buffer overflow vulnerability would allow a remote attacker
to launch a denial of service (DoS) attack. A buffer overflow vulnerability
in the function format_log_line
could allow remote attackers to cause a
DoS on the affected system. Exploitation of the vulnerability can be
triggered when the configuration file cupsd.conf
sets the value of
loglevel
to DEBUG
. No known patches or workarounds exist at time of
publication.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | cups | < 2.2.7-1ubuntu2.10 | UNKNOWN |
ubuntu | 20.04 | noarch | cups | < 2.3.1-9ubuntu1.3 | UNKNOWN |
ubuntu | 22.04 | noarch | cups | < 2.4.1op1-1ubuntu4.2 | UNKNOWN |
ubuntu | 22.10 | noarch | cups | < 2.4.2-1ubuntu2.1 | UNKNOWN |
ubuntu | 23.04 | noarch | cups | < 2.4.2-3ubuntu2.1 | UNKNOWN |
ubuntu | 16.04 | noarch | cups | < 2.1.3-4ubuntu0.11+esm2) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.9 Low
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:N/I:N/A:P
0.001 Low
EPSS
Percentile
28.9%