FreeBSD : cups-filters -- buffer overflow in texttopdf size allocation (b19da422-1e02-11e5-b43d-002590263bf5)

high Nessus Plugin ID 84484

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Stefan Cornelius from Red Hat reports :

A heap-based buffer overflow was discovered in the way the texttopdf utility of cups-filters processed print jobs with a specially crafted line size. An attacker being able to submit print jobs could exploit this flaw to crash texttopdf or, possibly, execute arbitrary code.

Till Kamppeter reports :

texttopdf: Fixed buffer overflow on size allocation of texttopdf when working with extremely small line sizes, which causes the size calculation to result in 0 (CVE-2015-3258, thanks to Stefan Cornelius from Red Hat for the patch).

Solution

Update the affected package.

See Also

https://www.openwall.com/lists/oss-security/2015/06/26/4

http://www.nessus.org/u?648c1352

http://www.nessus.org/u?e6063762

Plugin Details

Severity: High

ID: 84484

File Name: freebsd_pkg_b19da4221e0211e5b43d002590263bf5.nasl

Version: 2.6

Type: local

Published: 7/1/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:cups-filters, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 6/29/2015

Vulnerability Publication Date: 6/26/2015

Reference Information

CVE: CVE-2015-3258