CVE-2008-3639

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Heap-based buffer overflow in the read_rle16 function in imagetops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via an SGI image with malformed Run Length Encoded (RLE) data containing a small image and a large row count.

References

http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=753

http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html

http://secunia.com/advisories/32084

http://secunia.com/advisories/32226

http://secunia.com/advisories/32284

http://secunia.com/advisories/32292

http://secunia.com/advisories/32316

http://secunia.com/advisories/32331

http://secunia.com/advisories/33085

http://secunia.com/advisories/33111

http://sunsolve.sun.com/search/document.do?assetkey=1-26-261088-1

http://support.avaya.com/elmodocs2/security/ASA-2008-470.htm

http://www.cups.org/articles.php?L575

http://www.cups.org/str.php?L2918

http://www.debian.org/security/2008/dsa-1656

http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml

http://www.mandriva.com/security/advisories?name=MDVSA-2008:211

http://www.redhat.com/support/errata/RHSA-2008-0937.html

http://www.securityfocus.com/bid/31690

http://www.securitytracker.com/id?1021033

http://www.vupen.com/english/advisories/2008/2782

http://www.vupen.com/english/advisories/2008/3401

http://www.vupen.com/english/advisories/2009/1568

https://exchange.xforce.ibmcloud.com/vulnerabilities/45789

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11464

https://usn.ubuntu.com/656-1/

https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00331.html

https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00380.html

Details

Source: MITRE

Published: 2008-10-14

Updated: 2018-10-03

Type: CWE-119

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:* versions up to 1.3.8 (inclusive)

Tenable Plugins

View all (18 total)

IDNameProductFamilySeverity
67755Oracle Linux 3 / 4 / 5 : cups (ELSA-2008-0937)NessusOracle Linux Local Security Checks
critical
60483Scientific Linux Security Update : cups on SL3.x, SL4.x, SL5.x i386/x86_64NessusScientific Linux Local Security Checks
critical
41247SuSE9 Security Update : CUPS (YOU Patch Number 12261)NessusSuSE Local Security Checks
critical
39941openSUSE Security Update : cups (cups-232)NessusSuSE Local Security Checks
critical
37836Ubuntu 6.06 LTS / 7.04 / 7.10 / 8.04 LTS : cupsys vulnerabilities (USN-656-1)NessusUbuntu Local Security Checks
critical
36840Mandriva Linux Security Advisory : cups (MDVSA-2008:211)NessusMandriva Local Security Checks
critical
35086GLSA-200812-11 : CUPS: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
34719Slackware 12.0 / 12.1 / current : cups (SSA:2008-312-01)NessusSlackware Local Security Checks
critical
34449Debian DSA-1656-1 : cupsys - several vulnerabilitiesNessusDebian Local Security Checks
critical
34425Fedora 9 : cups-1.3.9-1.fc9 (2008-8844)NessusFedora Local Security Checks
critical
34424Fedora 8 : cups-1.3.9-1.fc8 (2008-8801)NessusFedora Local Security Checks
critical
4707CUPS < 1.3.9 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
high
34391FreeBSD : cups -- multiple vulnerabilities (ce29ce1d-971a-11dd-ab7e-001c2514716c)NessusFreeBSD Local Security Checks
critical
34385CUPS < 1.3.9 Multiple VulnerabilitiesNessusMisc.
high
34384RHEL 3 / 4 / 5 : cups (RHSA-2008:0937)NessusRed Hat Local Security Checks
critical
34375CentOS 3 / 4 / 5 : cups (CESA-2008:0937)NessusCentOS Local Security Checks
critical
34359SuSE 10 Security Update : CUPS (ZYPP Patch Number 5653)NessusSuSE Local Security Checks
critical
34358openSUSE 10 Security Update : cups (cups-5652)NessusSuSE Local Security Checks
critical