CVE-2008-5286

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.

References

http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html

http://secunia.com/advisories/32962

http://secunia.com/advisories/33101

http://secunia.com/advisories/33111

http://secunia.com/advisories/33568

http://svn.easysw.com/public/cups/trunk/CHANGES-1.3.txt

http://www.cups.org/str.php?L2974

http://www.debian.org/security/2008/dsa-1677

http://www.gentoo.org/security/en/glsa/glsa-200812-01.xml

http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml

http://www.mandriva.com/security/advisories?name=MDVSA-2009:028

http://www.mandriva.com/security/advisories?name=MDVSA-2009:029

http://www.openwall.com/lists/oss-security/2008/12/01/1

http://www.redhat.com/support/errata/RHSA-2008-1028.html

http://www.securityfocus.com/bid/32518

http://www.securitytracker.com/id?1021298

http://www.vupen.com/english/advisories/2008/3315

https://exchange.xforce.ibmcloud.com/vulnerabilities/46933

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10058

Details

Source: MITRE

Published: 2008-12-01

Updated: 2017-09-29

Type: CWE-189

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
67775Oracle Linux 3 : cups (ELSA-2008-1028)NessusOracle Linux Local Security Checks
high
60503Scientific Linux Security Update : cups on SL3.x, SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
41493SuSE 10 Security Update : Cups (ZYPP Patch Number 5845)NessusSuSE Local Security Checks
critical
41261SuSE9 Security Update : Cups (YOU Patch Number 12317)NessusSuSE Local Security Checks
critical
39943openSUSE Security Update : cups (cups-356)NessusSuSE Local Security Checks
critical
38132Ubuntu 6.06 LTS / 7.10 / 8.04 LTS / 8.10 : cups, cupsys vulnerabilities (USN-707-1)NessusUbuntu Local Security Checks
critical
36414Mandriva Linux Security Advisory : cups (MDVSA-2009:028)NessusMandriva Local Security Checks
critical
36183CUPS < 1.3.10 Multiple VulnerabilitiesNessusMisc.
high
35368openSUSE 10 Security Update : cups (cups-5838)NessusSuSE Local Security Checks
critical
35182RHEL 3 : cups (RHSA-2008:1028)NessusRed Hat Local Security Checks
high
35173CentOS 3 : cups (CESA-2008:1028)NessusCentOS Local Security Checks
high
35086GLSA-200812-11 : CUPS: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
35011Debian DSA-1677-1 : cupsys - integer overflowNessusDebian Local Security Checks
high
4771CUPS < 1.3.10 Multiple OverflowsNessus Network MonitorWeb Servers
high
34980FreeBSD : cups -- potential buffer overflow in PNG reading code (87106b67-be13-11dd-a578-0030843d3802)NessusFreeBSD Local Security Checks
high