SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   CUPS Vendors:   Easy Software Products
CUPS cupsRasterReadPixels() Buffer Overflow Has Unspecified Impact
SecurityTracker Alert ID:  1031776
SecurityTracker URL:  http://securitytracker.com/id/1031776
CVE Reference:   CVE-2014-9679   (Links to External Site)
Date:  Feb 20 2015
Impact:   Not specified
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in CUPS. The impact was not specified.

A remote user can send a specially crafted compressed raster file to trigger a buffer overflow in cupsRasterReadPixels().

The vulnerability resides in 'filter/raster.c'.

The vendor has assigned a priority of "Low" to this vulnerability.

Peter De Wachter reported this vulnerability.

Impact:   The impact was not specified.
Solution:   The vendor has issued a source code fix.

The vendor's advisory is available at:

https://www.cups.org/str.php?L4551

Vendor URL:  www.cups.org/str.php?L4551 (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Feb 26 2015 (Ubuntu Issues Fix) CUPS cupsRasterReadPixels() Buffer Overflow Has Unspecified Impact
Ubuntu has issued a fix for Ubuntu 10.04 LTS, 12.04 LTS, 14.04 LTS, and 14.10.
Jun 18 2015 (Red Hat Issues Fix) CUPS cupsRasterReadPixels() Buffer Overflow Has Unspecified Impact
Red Hat has issued a fix for Red Hat Enterprise Linux 6 and 7.
Jun 18 2015 (CentOS Issues Fix) CUPS cupsRasterReadPixels() Buffer Overflow Has Unspecified Impact
CentOS has issued a fix for CentOS 7.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC