[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2008:211 -- Mandriva cups

ID: oval:org.secpod.oval:def:301543Date: (C)2012-01-07   (M)2024-01-02
Class: PATCHFamily: unix




A buffer overflow in the SGI image format decoding routines used by the CUPS image converting filter imagetops was discovered. An attacker could create malicious SGI image files that could possibly execute arbitrary code if the file was printed . An integer overflow flaw leading to a heap buffer overflow was found in the Text-to-PostScript texttops filter. An attacker could create a malicious text file that could possibly execute arbitrary code if the file was printed . Finally, an insufficient buffer bounds checking flaw was found in the HP-GL/2-to-PostScript hpgltops filter. An attacker could create a malicious HP-GL/2 file that could possibly execute arbitrary code if the file was printed . The updated packages have been patched to prevent this issue; for Mandriva Linux 2009.0 the latest CUPS version is provided that corrects these issues and also provides other bug fixes.

Platform:
Mandriva Linux 2009.0
Mandriva Linux 2007.1
Mandriva Linux 2008.1
Mandriva Linux 2008.0
Product:
cups
Reference:
MDVSA-2008:211
CVE-2008-3641
CVE-2008-3640
CVE-2008-3639
CVE    3
CVE-2008-3640
CVE-2008-3641
CVE-2008-3639
CPE    4
cpe:/o:mandriva:linux:2008.1
cpe:/o:mandriva:linux:2009.0
cpe:/o:mandriva:linux:2007.1
cpe:/o:mandriva:linux:2008.0
...

© SecPod Technologies