Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2002-1371
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T03:19:28.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20021219 iDEFENSE Security Advisory 12.19.02: Multiple Security Vulnerabilities in Common Unix Printing System (CUPS)", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html" }, { "name": "CLSA-2003:702", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000702" }, { "name": "DSA-232", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-232" }, { "name": "SuSE-SA:2003:002", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2003_002_cups.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.idefense.com/advisory/12.19.02.txt" }, { "name": "RHSA-2002:295", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-295.html" }, { "name": "20021219 iDEFENSE Security Advisory 12.19.02: Multiple Security Vulnerabilities in Common Unix Printing System (CUPS)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=104032149026670\u0026w=2" }, { "name": "MDKSA-2003:001", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001" }, { "name": "cups-zero-width-images(10911)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10911" }, { "name": "6439", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/6439" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2002-12-19T00:00:00", "descriptions": [ { "lang": "en", "value": "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-12-20T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20021219 iDEFENSE Security Advisory 12.19.02: Multiple Security Vulnerabilities in Common Unix Printing System (CUPS)", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html" }, { "name": "CLSA-2003:702", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000702" }, { "name": "DSA-232", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-232" }, { "name": "SuSE-SA:2003:002", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2003_002_cups.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.idefense.com/advisory/12.19.02.txt" }, { "name": "RHSA-2002:295", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2002-295.html" }, { "name": "20021219 iDEFENSE Security Advisory 12.19.02: Multiple Security Vulnerabilities in Common Unix Printing System (CUPS)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=104032149026670\u0026w=2" }, { "name": "MDKSA-2003:001", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001" }, { "name": "cups-zero-width-images(10911)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10911" }, { "name": "6439", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/6439" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1371", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20021219 iDEFENSE Security Advisory 12.19.02: Multiple Security Vulnerabilities in Common Unix Printing System (CUPS)", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html" }, { "name": "CLSA-2003:702", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000702" }, { "name": "DSA-232", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-232" }, { "name": "SuSE-SA:2003:002", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2003_002_cups.html" }, { "name": "http://www.idefense.com/advisory/12.19.02.txt", "refsource": "MISC", "url": "http://www.idefense.com/advisory/12.19.02.txt" }, { "name": "RHSA-2002:295", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-295.html" }, { "name": "20021219 iDEFENSE Security Advisory 12.19.02: Multiple Security Vulnerabilities in Common Unix Printing System (CUPS)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104032149026670\u0026w=2" }, { "name": "MDKSA-2003:001", "refsource": "MANDRAKE", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001" }, { "name": "cups-zero-width-images(10911)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10911" }, { "name": "6439", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6439" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2002-1371", "datePublished": "2004-09-01T04:00:00", "dateReserved": "2002-12-16T00:00:00", "dateUpdated": "2024-08-08T03:19:28.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2002-1371\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2002-12-26T05:00:00.000\",\"lastModified\":\"2024-11-20T23:41:08.753\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.\"},{\"lang\":\"es\",\"value\":\"filters/image-gif.c en Common Unix Printing System (CUPS) 1.1.14 a 1.1.17 no comprueba adecuadamente im\u00e1genes GIF de tama\u00f1o cero, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante cabeceras de trozos modificadas, como ha sido demostrado por nogif\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68BD578F-CCAD-4515-9205-EB4F297C6DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3182CA2-7375-43BC-A0E5-DE11D4B65EE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCF4C8D0-3030-4DD5-800B-76A582A4CD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"734D0C2C-F71F-461A-87EE-202C6B706753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F0F402D-5CD0-4477-8B59-C753CECB02BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"959F7AFA-ED20-434C-993F-06C2A8574662\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4F5A0A4-2884-46CA-A846-8B954EB80CFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35E65857-12C7-49DE-AD27-3CACD456231C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47CEF035-57A6-470B-916A-E5562C28E866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D414984E-4F6B-4278-8346-968587E4B18E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C36DCB-2FDD-44E6-85E8-875575AAE69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDCF4FB3-F781-46D5-BEE7-485B3DC78B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CC0444-570C-4BB5-B53A-C5CA0BD87935\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000702\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=104032149026670\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-232\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.idefense.com/advisory/12.19.02.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2003_002_cups.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2002-295.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/6439\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/10911\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000702\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=104032149026670\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-232\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.idefense.com/advisory/12.19.02.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Vendor Advisory\"]},{\"url\":\"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2003_002_cups.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2002-295.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/6439\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/10911\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2002-1371
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2002-1371", "description": "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.", "id": "GSD-2002-1371", "references": [ "https://www.debian.org/security/2003/dsa-232", "https://access.redhat.com/errata/RHSA-2002:295" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2002-1371" ], "details": "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.", "id": "GSD-2002-1371", "modified": "2023-12-13T01:24:10.864144Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1371", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20021219 iDEFENSE Security Advisory 12.19.02: Multiple Security Vulnerabilities in Common Unix Printing System (CUPS)", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html" }, { "name": "CLSA-2003:702", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000702" }, { "name": "DSA-232", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-232" }, { "name": "SuSE-SA:2003:002", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2003_002_cups.html" }, { "name": "http://www.idefense.com/advisory/12.19.02.txt", "refsource": "MISC", "url": "http://www.idefense.com/advisory/12.19.02.txt" }, { "name": "RHSA-2002:295", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2002-295.html" }, { "name": "20021219 iDEFENSE Security Advisory 12.19.02: Multiple Security Vulnerabilities in Common Unix Printing System (CUPS)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=104032149026670\u0026w=2" }, { "name": "MDKSA-2003:001", "refsource": "MANDRAKE", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001" }, { "name": "cups-zero-width-images(10911)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10911" }, { "name": "6439", "refsource": "BID", "url": "http://www.securityfocus.com/bid/6439" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2002-1371" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.idefense.com/advisory/12.19.02.txt", "refsource": "MISC", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.idefense.com/advisory/12.19.02.txt" }, { "name": "20021219 iDEFENSE Security Advisory 12.19.02: Multiple Security Vulnerabilities in Common Unix Printing System (CUPS)", "refsource": "VULNWATCH", "tags": [], "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html" }, { "name": "CLSA-2003:702", "refsource": "CONECTIVA", "tags": [], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000702" }, { "name": "DSA-232", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2003/dsa-232" }, { "name": "MDKSA-2003:001", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001" }, { "name": "RHSA-2002:295", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2002-295.html" }, { "name": "SuSE-SA:2003:002", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2003_002_cups.html" }, { "name": "6439", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/6439" }, { "name": "20021219 iDEFENSE Security Advisory 12.19.02: Multiple Security Vulnerabilities in Common Unix Printing System (CUPS)", "refsource": "BUGTRAQ", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=104032149026670\u0026w=2" }, { "name": "cups-zero-width-images(10911)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10911" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-10T01:30Z", "publishedDate": "2002-12-26T05:00Z" } } }
rhsa-2002_295
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated CUPS packages are available for Red Hat Linux 7.3 and 8.0 which fix\nvarious security issues.", "title": "Topic" }, { "category": "general", "text": "The Common UNIX Printing System (CUPS) provides a portable printing\nlayer. A number of vulnerabilities have been discovered in CUPS.\n\nCUPS was distributed with Red Hat Linux 7.3 and 8.0 but is not\ninstalled by default.\n\n1. An integer overflow exists in the CUPS HTTP interface that allows\na local attacker to gain the permissions of the \u0027lp\u0027 user. (CAN-2002-1383)\n\n2. A race condition exists in the creation of a pid file which allows\nan attacker who already has privileges of the \u0027lp\u0027 user (for example from\nutilizing a different exploit) to create or overwrite any file as\nroot, leading to arbitrary code execution. (CAN-2002-1366)\n\n3. It is possible to remotely add a printer to CUPS by sending a\nspecially crafted UDP packet. If an attacker utilizes this vulnerability,\nthey could add a printer with a tainted name that if clicked on in the\nweb administration interface could be used to exploit other\nvulnerabilities. (CAN-2002-1367)\n\nBy utilizing this vulnerability, an attacker could take a number of steps\nto be able to get hold of the certificate used to access the administrative\nsection of the CUPS server and potentially add a printer that will execute\ncommands with root privileges.\n\n4. Problems with chunked encoding and negative content length handling\nin the CUPS HTTP interface can cause CUPS to crash. On Red Hat Linux\nplatforms this can cause a denial of service (DoS) against CUPS. \n(CAN-2002-1368)\n\n5. A number of integer overflows exist in the image handling code of\nthe filters in CUPS. In addition, CUPS does not properly check for\nzero width GIF images. These vulnerabilities allow an attacker who has\nthe ability to print to run arbitrary code as the \u0027lp\u0027 user. (CAN-2002-1371)\n\n6. An integer overflow exists in the CUPS pdftops filter. This can be\nexploited by an attacker who is able to print sending a carefully\ncrafted PDF file which can execute arbitrary commands as the \u0027lp\u0027 user.\n(CAN-2002-1384)\n\n7. A buffer overflow exists in setting up the job management options.\nWhen combined with other vulnerabilities, this could allow a local user\nto gain root privileges. This issue only affects the version of CUPS\nshipped with Red Hat Linux 7.3. (CAN-2002-1369)\n\n8. A bug in the select() call would allow an easy DoS attack which would\ncause CUPS to not recover once the DoS has stopped. (CAN-2002-1372)\n\nRed Hat Linux 7.3 and 8.0 were shipped with versions of CUPS that are\nvulnerable to these issues. All users of CUPS are advised to upgrade to the\nerratum packages which contain a patch to correct these issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2002:295", "url": "https://access.redhat.com/errata/RHSA-2002:295" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2002_295.json" } ], "title": "Red Hat Security Advisory: : Updated CUPS packages fix various vulnerabilities", "tracking": { "current_release_date": "2024-11-21T22:34:21+00:00", "generator": { "date": "2024-11-21T22:34:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2002:295", "initial_release_date": "2003-01-13T15:34:00+00:00", "revision_history": [ { "date": "2003-01-13T15:34:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:34:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Linux 8.0", "product": { "name": "Red Hat Linux 8.0", "product_id": "Red Hat Linux 8.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:8.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1366", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616888" } ], "notes": [ { "category": "description", "text": "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows local users with lp privileges to create or overwrite arbitrary files via file race conditions, as demonstrated by ice-cream.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1366" }, { "category": "external", "summary": "RHBZ#1616888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616888" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1366", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1366" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1366", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1366" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1367", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616889" } ], "notes": [ { "category": "description", "text": "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to add printers without authentication via a certain UDP packet, which can then be used to perform unauthorized activities such as stealing the local root certificate for the administration server via a \"need authorization\" page, as demonstrated by new-coke.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1367" }, { "category": "external", "summary": "RHBZ#1616889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616889" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1367", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1367" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1367", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1367" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1368", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616890" } ], "notes": [ { "category": "description", "text": "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing negative arguments to be fed into memcpy() calls via HTTP requests with (1) a negative Content-Length value or (2) a negative length in a chunked transfer encoding.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1368" }, { "category": "external", "summary": "RHBZ#1616890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1368", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1368" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1368", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1368" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1369", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616891" } ], "notes": [ { "category": "description", "text": "jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1369" }, { "category": "external", "summary": "RHBZ#1616891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1369", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1369" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1369", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1369" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1371", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616892" } ], "notes": [ { "category": "description", "text": "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1371" }, { "category": "external", "summary": "RHBZ#1616892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1371", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1371" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1371", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1371" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1372", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616893" } ], "notes": [ { "category": "description", "text": "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check the return values of various file and socket operations, which could allow a remote attacker to cause a denial of service (resource exhaustion) by causing file descriptors to be assigned and not released, as demonstrated by fanta.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1372" }, { "category": "external", "summary": "RHBZ#1616893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1372", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1372" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1372", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1372" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1383", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616902" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1383" }, { "category": "external", "summary": "RHBZ#1616902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616902" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1383", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1383" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1383", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1383" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1384", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616903" } ], "notes": [ { "category": "description", "text": "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1384" }, { "category": "external", "summary": "RHBZ#1616903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1384", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1384" } ], "release_date": "2002-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
RHSA-2002:295
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated CUPS packages are available for Red Hat Linux 7.3 and 8.0 which fix\nvarious security issues.", "title": "Topic" }, { "category": "general", "text": "The Common UNIX Printing System (CUPS) provides a portable printing\nlayer. A number of vulnerabilities have been discovered in CUPS.\n\nCUPS was distributed with Red Hat Linux 7.3 and 8.0 but is not\ninstalled by default.\n\n1. An integer overflow exists in the CUPS HTTP interface that allows\na local attacker to gain the permissions of the \u0027lp\u0027 user. (CAN-2002-1383)\n\n2. A race condition exists in the creation of a pid file which allows\nan attacker who already has privileges of the \u0027lp\u0027 user (for example from\nutilizing a different exploit) to create or overwrite any file as\nroot, leading to arbitrary code execution. (CAN-2002-1366)\n\n3. It is possible to remotely add a printer to CUPS by sending a\nspecially crafted UDP packet. If an attacker utilizes this vulnerability,\nthey could add a printer with a tainted name that if clicked on in the\nweb administration interface could be used to exploit other\nvulnerabilities. (CAN-2002-1367)\n\nBy utilizing this vulnerability, an attacker could take a number of steps\nto be able to get hold of the certificate used to access the administrative\nsection of the CUPS server and potentially add a printer that will execute\ncommands with root privileges.\n\n4. Problems with chunked encoding and negative content length handling\nin the CUPS HTTP interface can cause CUPS to crash. On Red Hat Linux\nplatforms this can cause a denial of service (DoS) against CUPS. \n(CAN-2002-1368)\n\n5. A number of integer overflows exist in the image handling code of\nthe filters in CUPS. In addition, CUPS does not properly check for\nzero width GIF images. These vulnerabilities allow an attacker who has\nthe ability to print to run arbitrary code as the \u0027lp\u0027 user. (CAN-2002-1371)\n\n6. An integer overflow exists in the CUPS pdftops filter. This can be\nexploited by an attacker who is able to print sending a carefully\ncrafted PDF file which can execute arbitrary commands as the \u0027lp\u0027 user.\n(CAN-2002-1384)\n\n7. A buffer overflow exists in setting up the job management options.\nWhen combined with other vulnerabilities, this could allow a local user\nto gain root privileges. This issue only affects the version of CUPS\nshipped with Red Hat Linux 7.3. (CAN-2002-1369)\n\n8. A bug in the select() call would allow an easy DoS attack which would\ncause CUPS to not recover once the DoS has stopped. (CAN-2002-1372)\n\nRed Hat Linux 7.3 and 8.0 were shipped with versions of CUPS that are\nvulnerable to these issues. All users of CUPS are advised to upgrade to the\nerratum packages which contain a patch to correct these issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2002:295", "url": "https://access.redhat.com/errata/RHSA-2002:295" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2002_295.json" } ], "title": "Red Hat Security Advisory: : Updated CUPS packages fix various vulnerabilities", "tracking": { "current_release_date": "2025-01-16T18:55:44+00:00", "generator": { "date": "2025-01-16T18:55:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.6" } }, "id": "RHSA-2002:295", "initial_release_date": "2003-01-13T15:34:00+00:00", "revision_history": [ { "date": "2003-01-13T15:34:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-16T18:55:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Linux 8.0", "product": { "name": "Red Hat Linux 8.0", "product_id": "Red Hat Linux 8.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:8.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1366", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616888" } ], "notes": [ { "category": "description", "text": "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows local users with lp privileges to create or overwrite arbitrary files via file race conditions, as demonstrated by ice-cream.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1366" }, { "category": "external", "summary": "RHBZ#1616888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616888" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1366", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1366" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1366", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1366" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1367", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616889" } ], "notes": [ { "category": "description", "text": "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to add printers without authentication via a certain UDP packet, which can then be used to perform unauthorized activities such as stealing the local root certificate for the administration server via a \"need authorization\" page, as demonstrated by new-coke.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1367" }, { "category": "external", "summary": "RHBZ#1616889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616889" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1367", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1367" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1367", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1367" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1368", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616890" } ], "notes": [ { "category": "description", "text": "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing negative arguments to be fed into memcpy() calls via HTTP requests with (1) a negative Content-Length value or (2) a negative length in a chunked transfer encoding.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1368" }, { "category": "external", "summary": "RHBZ#1616890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1368", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1368" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1368", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1368" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1369", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616891" } ], "notes": [ { "category": "description", "text": "jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1369" }, { "category": "external", "summary": "RHBZ#1616891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1369", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1369" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1369", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1369" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1371", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616892" } ], "notes": [ { "category": "description", "text": "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1371" }, { "category": "external", "summary": "RHBZ#1616892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1371", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1371" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1371", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1371" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1372", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616893" } ], "notes": [ { "category": "description", "text": "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check the return values of various file and socket operations, which could allow a remote attacker to cause a denial of service (resource exhaustion) by causing file descriptors to be assigned and not released, as demonstrated by fanta.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1372" }, { "category": "external", "summary": "RHBZ#1616893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1372", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1372" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1372", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1372" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1383", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616902" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1383" }, { "category": "external", "summary": "RHBZ#1616902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616902" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1383", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1383" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1383", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1383" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1384", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616903" } ], "notes": [ { "category": "description", "text": "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1384" }, { "category": "external", "summary": "RHBZ#1616903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1384", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1384" } ], "release_date": "2002-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2002:295
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated CUPS packages are available for Red Hat Linux 7.3 and 8.0 which fix\nvarious security issues.", "title": "Topic" }, { "category": "general", "text": "The Common UNIX Printing System (CUPS) provides a portable printing\nlayer. A number of vulnerabilities have been discovered in CUPS.\n\nCUPS was distributed with Red Hat Linux 7.3 and 8.0 but is not\ninstalled by default.\n\n1. An integer overflow exists in the CUPS HTTP interface that allows\na local attacker to gain the permissions of the \u0027lp\u0027 user. (CAN-2002-1383)\n\n2. A race condition exists in the creation of a pid file which allows\nan attacker who already has privileges of the \u0027lp\u0027 user (for example from\nutilizing a different exploit) to create or overwrite any file as\nroot, leading to arbitrary code execution. (CAN-2002-1366)\n\n3. It is possible to remotely add a printer to CUPS by sending a\nspecially crafted UDP packet. If an attacker utilizes this vulnerability,\nthey could add a printer with a tainted name that if clicked on in the\nweb administration interface could be used to exploit other\nvulnerabilities. (CAN-2002-1367)\n\nBy utilizing this vulnerability, an attacker could take a number of steps\nto be able to get hold of the certificate used to access the administrative\nsection of the CUPS server and potentially add a printer that will execute\ncommands with root privileges.\n\n4. Problems with chunked encoding and negative content length handling\nin the CUPS HTTP interface can cause CUPS to crash. On Red Hat Linux\nplatforms this can cause a denial of service (DoS) against CUPS. \n(CAN-2002-1368)\n\n5. A number of integer overflows exist in the image handling code of\nthe filters in CUPS. In addition, CUPS does not properly check for\nzero width GIF images. These vulnerabilities allow an attacker who has\nthe ability to print to run arbitrary code as the \u0027lp\u0027 user. (CAN-2002-1371)\n\n6. An integer overflow exists in the CUPS pdftops filter. This can be\nexploited by an attacker who is able to print sending a carefully\ncrafted PDF file which can execute arbitrary commands as the \u0027lp\u0027 user.\n(CAN-2002-1384)\n\n7. A buffer overflow exists in setting up the job management options.\nWhen combined with other vulnerabilities, this could allow a local user\nto gain root privileges. This issue only affects the version of CUPS\nshipped with Red Hat Linux 7.3. (CAN-2002-1369)\n\n8. A bug in the select() call would allow an easy DoS attack which would\ncause CUPS to not recover once the DoS has stopped. (CAN-2002-1372)\n\nRed Hat Linux 7.3 and 8.0 were shipped with versions of CUPS that are\nvulnerable to these issues. All users of CUPS are advised to upgrade to the\nerratum packages which contain a patch to correct these issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2002:295", "url": "https://access.redhat.com/errata/RHSA-2002:295" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2002_295.json" } ], "title": "Red Hat Security Advisory: : Updated CUPS packages fix various vulnerabilities", "tracking": { "current_release_date": "2025-01-16T18:55:44+00:00", "generator": { "date": "2025-01-16T18:55:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.6" } }, "id": "RHSA-2002:295", "initial_release_date": "2003-01-13T15:34:00+00:00", "revision_history": [ { "date": "2003-01-13T15:34:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-02-07T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-01-16T18:55:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Linux 8.0", "product": { "name": "Red Hat Linux 8.0", "product_id": "Red Hat Linux 8.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:8.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1366", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616888" } ], "notes": [ { "category": "description", "text": "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows local users with lp privileges to create or overwrite arbitrary files via file race conditions, as demonstrated by ice-cream.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1366" }, { "category": "external", "summary": "RHBZ#1616888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616888" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1366", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1366" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1366", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1366" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1367", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616889" } ], "notes": [ { "category": "description", "text": "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to add printers without authentication via a certain UDP packet, which can then be used to perform unauthorized activities such as stealing the local root certificate for the administration server via a \"need authorization\" page, as demonstrated by new-coke.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1367" }, { "category": "external", "summary": "RHBZ#1616889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616889" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1367", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1367" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1367", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1367" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1368", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616890" } ], "notes": [ { "category": "description", "text": "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing negative arguments to be fed into memcpy() calls via HTTP requests with (1) a negative Content-Length value or (2) a negative length in a chunked transfer encoding.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1368" }, { "category": "external", "summary": "RHBZ#1616890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1368", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1368" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1368", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1368" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1369", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616891" } ], "notes": [ { "category": "description", "text": "jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1369" }, { "category": "external", "summary": "RHBZ#1616891", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616891" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1369", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1369" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1369", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1369" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1371", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616892" } ], "notes": [ { "category": "description", "text": "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1371" }, { "category": "external", "summary": "RHBZ#1616892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1371", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1371" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1371", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1371" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1372", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616893" } ], "notes": [ { "category": "description", "text": "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check the return values of various file and socket operations, which could allow a remote attacker to cause a denial of service (resource exhaustion) by causing file descriptors to be assigned and not released, as demonstrated by fanta.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1372" }, { "category": "external", "summary": "RHBZ#1616893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1372", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1372" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1372", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1372" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2002-1383", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616902" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1383" }, { "category": "external", "summary": "RHBZ#1616902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616902" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1383", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1383" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1383", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1383" } ], "release_date": "2002-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "title": "security flaw" }, { "cve": "CVE-2002-1384", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616903" } ], "notes": [ { "category": "description", "text": "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1384" }, { "category": "external", "summary": "RHBZ#1616903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1384", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1384" } ], "release_date": "2002-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-01-13T15:34:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2002:295" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
fkie_cve-2002-1371
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
easy_software_products | cups | 1.0.4 | |
easy_software_products | cups | 1.0.4_8 | |
easy_software_products | cups | 1.1.1 | |
easy_software_products | cups | 1.1.4 | |
easy_software_products | cups | 1.1.4_2 | |
easy_software_products | cups | 1.1.4_3 | |
easy_software_products | cups | 1.1.4_5 | |
easy_software_products | cups | 1.1.6 | |
easy_software_products | cups | 1.1.7 | |
easy_software_products | cups | 1.1.10 | |
easy_software_products | cups | 1.1.13 | |
easy_software_products | cups | 1.1.14 | |
easy_software_products | cups | 1.1.17 | |
apple | mac_os_x | 10.2 | |
apple | mac_os_x | 10.2.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "68BD578F-CCAD-4515-9205-EB4F297C6DB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", "matchCriteriaId": "F3182CA2-7375-43BC-A0E5-DE11D4B65EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "FCF4C8D0-3030-4DD5-800B-76A582A4CD0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "734D0C2C-F71F-461A-87EE-202C6B706753", "vulnerable": true }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", "matchCriteriaId": "3F0F402D-5CD0-4477-8B59-C753CECB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", "matchCriteriaId": "959F7AFA-ED20-434C-993F-06C2A8574662", "vulnerable": true }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", "matchCriteriaId": "D4F5A0A4-2884-46CA-A846-8B954EB80CFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "35E65857-12C7-49DE-AD27-3CACD456231C", "vulnerable": true }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "47CEF035-57A6-470B-916A-E5562C28E866", "vulnerable": true }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D414984E-4F6B-4278-8346-968587E4B18E", "vulnerable": true }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "33C36DCB-2FDD-44E6-85E8-875575AAE69E", "vulnerable": true }, { "criteria": "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*", "matchCriteriaId": "CDCF4FB3-F781-46D5-BEE7-485B3DC78B83", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "56CC0444-570C-4BB5-B53A-C5CA0BD87935", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif." }, { "lang": "es", "value": "filters/image-gif.c en Common Unix Printing System (CUPS) 1.1.14 a 1.1.17 no comprueba adecuadamente im\u00e1genes GIF de tama\u00f1o cero, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante cabeceras de trozos modificadas, como ha sido demostrado por nogif" } ], "id": "CVE-2002-1371", "lastModified": "2024-11-20T23:41:08.753", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2002-12-26T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html" }, { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000702" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=104032149026670\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2003/dsa-232" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.idefense.com/advisory/12.19.02.txt" }, { "source": "cve@mitre.org", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2003_002_cups.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2002-295.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/6439" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10911" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000702" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=104032149026670\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2003/dsa-232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.idefense.com/advisory/12.19.02.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2003_002_cups.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2002-295.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/6439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10911" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-v85m-c74w-mhg8
Vulnerability from github
filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.
{ "affected": [], "aliases": [ "CVE-2002-1371" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2002-12-26T05:00:00Z", "severity": "HIGH" }, "details": "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.", "id": "GHSA-v85m-c74w-mhg8", "modified": "2022-04-30T18:21:01Z", "published": "2022-04-30T18:21:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1371" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10911" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000702" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=104032149026670\u0026w=2" }, { "type": "WEB", "url": "http://www.debian.org/security/2003/dsa-232" }, { "type": "WEB", "url": "http://www.idefense.com/advisory/12.19.02.txt" }, { "type": "WEB", "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2003_002_cups.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2002-295.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/6439" } ], "schema_version": "1.4.0", "severity": [] }
var-200212-0657
Vulnerability from variot
filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ Common Unix Printing System (CUPS) Some UNIX Included in the UNIX Can be used universally in the environment Internet Printing Protocol version 1.1 (IPP/1.1) Is a printing system that supports Red Hat Linux 7.3 as well as 8.0 It is also bundled with. this CUPS Has the following security issues: still, Red Hat Linux Then CUPS Is disabled in the default installation. 1. Overflow due to overflow of integer digits * [CAN-2002-1383] CUPS There are a few problems with overflowing integer digits. For example, HTTP By exploiting this issue through the interface, a remote attacker can CUPSd Execute permission ( A user lp) Can execute arbitrary code. 2. Resource race condition for temporary file generation processing (race condition) Problem * [CAN-2002-1366] CUPS Is /etc/cups/certs/ less than pid ( Generation time CUPS Process ID) Creates a temporary file with a file name of, so a local attacker can predict how the temporary file name is determined. Therefore, by creating a file with the same name as the temporary file that points to the intended file, root Any file can be overwritten or created with authority. In order to execute this attack, 1. In advance, lp User rights are required. 3. Printer addition mechanism / Problems with the access control function * [CAN-2002-1367] Malicious maliciously created remotely UDP Packet CUPS By sending to, you can bypass the authentication and add a printer. Furthermore, there is a problem that the access control mechanism of the printer addition mechanism neglects the validity check. The added printer information is root Since it is interpreted by the authority, any print can be added by using these problems together. As a result, local attackers root Elevation to privilege is possible. 4. Intentionally created HTTP By communication CUPSd That crashes [CAN-2002-1368] CUPS Then IPP To accept connections on the backend HTTP server (CUPSd) Is included. this HTTP Server HTTP The remote attacker is not able to verify the validity of the range of received values in the handling part of Contents-Length: The field was set to a negative value, or intentionally assembled and chunked HTTP By trying to communicate with the protocol, CUPS Can be put into a denial of service. To restore normal operation CUPSd Needs to be restarted. 5. strncat Problem of buffer overflow caused by function [CAN-2002-1369] CUPS Has a buffer overflow problem when receiving a printer job with a specific attribute value. By using this issue, a remote attacker can root It is possible to execute arbitrary code with authority. To take advantage of this issue, 3. Need to take advantage of the problem. 6.GIF Problems when handling file formats [CAN-2002-1371] CUPS In GIF Width in the part that handles format files (width) There is a problem with the process of validating the value of. 7. File descriptor issues with sockets and files * [CAN-2002-1372] CUPS Has a problem that does not properly close file descriptors for sockets and files. For this reason, local attackers can use this issue to cause memory leaks, CUPS It is possible to put the entire system running in a service out of service state.Please refer to the “Overview” for the impact of this vulnerability. As a result, if an attacker submits a properly malformed image, it may be possible to corrupt memory with attacker-supplied data. Successful exploitation will result in arbitrary code execution in the security context of CUPS. The attacker must be able to cause the malformed image to be processed by CUPS to exploit this issue. The system is based on the Internet Printing Protocol (IPP) and provides most PostScript and raster printer services. Remote attackers can exploit this vulnerability to conduct a denial of service attack on CUPS, and may execute arbitrary commands on the system with CUPS process privileges. xpos + +; temp += bpp; if (xpos == img->xsize) { ImagePutRow(img, 0, ypos, img->xsize, pixels); ..
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200212-0657", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cups", "scope": "eq", "trust": 1.6, "vendor": "easy products", "version": "1.1.17" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "easy products", "version": "1.0.4_8" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "easy products", "version": "1.1.4" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "easy products", "version": "1.1.6" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "easy products", "version": "1.0.4" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "easy products", "version": "1.1.4_2" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "easy products", "version": "1.1.13" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.2" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "easy products", "version": "1.1.10" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "easy products", "version": "1.1.4_3" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "easy products", "version": "1.1.14" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "easy products", "version": "1.1.4_5" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "easy products", "version": "1.1.1" }, { "model": "cups", "scope": "eq", "trust": 1.0, "vendor": "easy products", "version": "1.1.7" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "7.3" }, { "model": "linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "8.0" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.17" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.16" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.15" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.14" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.13" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.10" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.7" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.6" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.4-5" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.4-3" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.4-2" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.4" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.1" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.0.4-8" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.0.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "software products cups", "scope": "ne", "trust": 0.3, "vendor": "easy", "version": "1.1.18" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" } ], "sources": [ { "db": "BID", "id": "6439" }, { "db": "JVNDB", "id": "JVNDB-2002-000334" }, { "db": "CNNVD", "id": "CNNVD-200212-067" }, { "db": "NVD", "id": "CVE-2002-1371" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:redhat:linux", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2002-000334" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "iDEFENSE Labs\u203b labs@idefense.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200212-067" } ], "trust": 0.6 }, "cve": "CVE-2002-1371", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2002-1371", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-5756", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2002-1371", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2002-1371", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-200212-067", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-5756", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-5756" }, { "db": "JVNDB", "id": "JVNDB-2002-000334" }, { "db": "CNNVD", "id": "CNNVD-200212-067" }, { "db": "NVD", "id": "CVE-2002-1371" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ Common Unix Printing System (CUPS) Some UNIX Included in the UNIX Can be used universally in the environment Internet Printing Protocol version 1.1 (IPP/1.1) Is a printing system that supports Red Hat Linux 7.3 as well as 8.0 It is also bundled with. this CUPS Has the following security issues: still, Red Hat Linux Then CUPS Is disabled in the default installation. 1. Overflow due to overflow of integer digits * [CAN-2002-1383] CUPS There are a few problems with overflowing integer digits. For example, HTTP By exploiting this issue through the interface, a remote attacker can CUPSd Execute permission ( A user lp) Can execute arbitrary code. 2. Resource race condition for temporary file generation processing (race condition) Problem * [CAN-2002-1366] CUPS Is /etc/cups/certs/ less than pid ( Generation time CUPS Process ID) Creates a temporary file with a file name of, so a local attacker can predict how the temporary file name is determined. Therefore, by creating a file with the same name as the temporary file that points to the intended file, root Any file can be overwritten or created with authority. In order to execute this attack, 1. In advance, lp User rights are required. 3. Printer addition mechanism / Problems with the access control function * [CAN-2002-1367] Malicious maliciously created remotely UDP Packet CUPS By sending to, you can bypass the authentication and add a printer. Furthermore, there is a problem that the access control mechanism of the printer addition mechanism neglects the validity check. The added printer information is root Since it is interpreted by the authority, any print can be added by using these problems together. As a result, local attackers root Elevation to privilege is possible. 4. Intentionally created HTTP By communication CUPSd That crashes [CAN-2002-1368] CUPS Then IPP To accept connections on the backend HTTP server (CUPSd) Is included. this HTTP Server HTTP The remote attacker is not able to verify the validity of the range of received values in the handling part of Contents-Length: The field was set to a negative value, or intentionally assembled and chunked HTTP By trying to communicate with the protocol, CUPS Can be put into a denial of service. To restore normal operation CUPSd Needs to be restarted. 5. strncat Problem of buffer overflow caused by function [CAN-2002-1369] CUPS Has a buffer overflow problem when receiving a printer job with a specific attribute value. By using this issue, a remote attacker can root It is possible to execute arbitrary code with authority. To take advantage of this issue, 3. Need to take advantage of the problem. 6.GIF Problems when handling file formats [CAN-2002-1371] CUPS In GIF Width in the part that handles format files (width) There is a problem with the process of validating the value of. 7. File descriptor issues with sockets and files * [CAN-2002-1372] CUPS Has a problem that does not properly close file descriptors for sockets and files. For this reason, local attackers can use this issue to cause memory leaks, CUPS It is possible to put the entire system running in a service out of service state.Please refer to the \u201cOverview\u201d for the impact of this vulnerability. As a result, if an attacker submits a properly malformed image, it may be possible to corrupt memory with attacker-supplied data. \nSuccessful exploitation will result in arbitrary code execution in the security context of CUPS. The attacker must be able to cause the malformed image to be processed by CUPS to exploit this issue. The system is based on the Internet Printing Protocol (IPP) and provides most PostScript and raster printer services. Remote attackers can exploit this vulnerability to conduct a denial of service attack on CUPS, and may execute arbitrary commands on the system with CUPS process privileges. xpos + +; temp += bpp; if (xpos == img-\u003exsize) { ImagePutRow(img, 0, ypos, img-\u003exsize, pixels); ..", "sources": [ { "db": "NVD", "id": "CVE-2002-1371" }, { "db": "JVNDB", "id": "JVNDB-2002-000334" }, { "db": "BID", "id": "6439" }, { "db": "VULHUB", "id": "VHN-5756" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2002-1371", "trust": 2.8 }, { "db": "BID", "id": "6439", "trust": 2.8 }, { "db": "BID", "id": "6435", "trust": 0.8 }, { "db": "BID", "id": "6437", "trust": 0.8 }, { "db": "BID", "id": "6434", "trust": 0.8 }, { "db": "BID", "id": "6433", "trust": 0.8 }, { "db": "BID", "id": "6440", "trust": 0.8 }, { "db": "BID", "id": "6436", "trust": 0.8 }, { "db": "BID", "id": "6438", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2002-000334", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200212-067", "trust": 0.7 }, { "db": "SUSE", "id": "SUSE-SA:2003:002", "trust": 0.6 }, { "db": "XF", "id": "10911", "trust": 0.6 }, { "db": "CONECTIVA", "id": "CLSA-2003:702", "trust": 0.6 }, { "db": "MANDRAKE", "id": "MDKSA-2003:001", "trust": 0.6 }, { "db": "VULNWATCH", "id": "20021219 IDEFENSE SECURITY ADVISORY 12.19.02: MULTIPLE SECURITY VULNERABILITIES IN COMMON UNIX PRINTING SYSTEM (CUPS)", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-232", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20021219 IDEFENSE SECURITY ADVISORY 12.19.02: MULTIPLE SECURITY VULNERABILITIES IN COMMON UNIX PRINTING SYSTEM (CUPS)", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2002:295", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-5756", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-5756" }, { "db": "BID", "id": "6439" }, { "db": "JVNDB", "id": "JVNDB-2002-000334" }, { "db": "CNNVD", "id": "CNNVD-200212-067" }, { "db": "NVD", "id": "CVE-2002-1371" } ] }, "id": "VAR-200212-0657", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-5756" } ], "trust": 0.01 }, "last_update_date": "2024-11-22T22:48:43.385000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RHSA-2002:295", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2002-295.html" }, { "title": "RHSA-2002:295", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2002-295J.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2002-000334" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2002-1371" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.5, "url": "http://www.securityfocus.com/bid/6439" }, { "trust": 3.3, "url": "http://www.idefense.com/advisory/12.19.02.txt" }, { "trust": 2.7, "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000702" }, { "trust": 2.7, "url": "http://www.debian.org/security/2003/dsa-232" }, { "trust": 2.7, "url": "http://www.mandrakesoft.com/security/advisories?name=mdksa-2003:001" }, { "trust": 2.7, "url": "http://www.redhat.com/support/errata/rhsa-2002-295.html" }, { "trust": 2.7, "url": "http://www.novell.com/linux/security/advisories/2003_002_cups.html" }, { "trust": 2.7, "url": "http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html" }, { "trust": 2.1, "url": "http://marc.info/?l=bugtraq\u0026m=104032149026670\u0026w=2" }, { "trust": 2.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10911" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2002-1371" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-1371" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/6438" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/6440" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/6437" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/6434" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/6433" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/6435" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/6436" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/10911" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104032149026670\u0026w=2" }, { "trust": 0.3, "url": "http://www.info.apple.com/usen/security/security_updates.html" }, { "trust": 0.3, "url": "/archive/1/304031" }, { "trust": 0.3, "url": "/archive/1/304265" } ], "sources": [ { "db": "VULHUB", "id": "VHN-5756" }, { "db": "BID", "id": "6439" }, { "db": "JVNDB", "id": "JVNDB-2002-000334" }, { "db": "CNNVD", "id": "CNNVD-200212-067" }, { "db": "NVD", "id": "CVE-2002-1371" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-5756" }, { "db": "BID", "id": "6439" }, { "db": "JVNDB", "id": "JVNDB-2002-000334" }, { "db": "CNNVD", "id": "CNNVD-200212-067" }, { "db": "NVD", "id": "CVE-2002-1371" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2002-12-26T00:00:00", "db": "VULHUB", "id": "VHN-5756" }, { "date": "2002-12-19T00:00:00", "db": "BID", "id": "6439" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2002-000334" }, { "date": "2002-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-200212-067" }, { "date": "2002-12-26T05:00:00", "db": "NVD", "id": "CVE-2002-1371" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-10T00:00:00", "db": "VULHUB", "id": "VHN-5756" }, { "date": "2009-07-11T19:17:00", "db": "BID", "id": "6439" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2002-000334" }, { "date": "2006-01-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200212-067" }, { "date": "2024-11-20T23:41:08.753000", "db": "NVD", "id": "CVE-2002-1371" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200212-067" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CUPS of filters/image-gif.c Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2002-000334" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Boundary Condition Error", "sources": [ { "db": "BID", "id": "6439" }, { "db": "CNNVD", "id": "CNNVD-200212-067" } ], "trust": 0.9 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.