CVE-2011-3170

medium

Description

The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896.

References

https://bugzilla.redhat.com/show_bug.cgi?id=727800

http://secunia.com/advisories/45796

http://secunia.com/advisories/46024

http://security.gentoo.org/glsa/glsa-201207-10.xml

https://exchange.xforce.ibmcloud.com/vulnerabilities/69380

http://www.debian.org/security/2011/dsa-2354

http://www.mandriva.com/security/advisories?name=MDVSA-2011:146

http://www.mandriva.com/security/advisories?name=MDVSA-2011:147

http://www.securitytracker.com/id?1025980

http://www.ubuntu.com/usn/USN-1207-1

Details

Source: Mitre, NVD

Published: 2011-08-19

Risk Information

CVSS v2

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Severity: Medium