cpe:/a:apple:cups:1.1 cpe:/a:apple:cups:1.1.1 cpe:/a:apple:cups:1.1.2 cpe:/a:apple:cups:1.1.3 cpe:/a:apple:cups:1.1.4 cpe:/a:apple:cups:1.1.5 cpe:/a:apple:cups:1.1.5-1 cpe:/a:apple:cups:1.1.5-2 cpe:/a:apple:cups:1.1.6 cpe:/a:apple:cups:1.1.6-1 cpe:/a:apple:cups:1.1.6-2 cpe:/a:apple:cups:1.1.6-3 cpe:/a:apple:cups:1.1.7 cpe:/a:apple:cups:1.1.8 cpe:/a:apple:cups:1.1.9 cpe:/a:apple:cups:1.1.9-1 cpe:/a:apple:cups:1.1.10 cpe:/a:apple:cups:1.1.10-1 cpe:/a:apple:cups:1.1.11 cpe:/a:apple:cups:1.1.12 cpe:/a:apple:cups:1.1.13 cpe:/a:apple:cups:1.1.14 cpe:/a:apple:cups:1.1.15 cpe:/a:apple:cups:1.1.16 cpe:/a:apple:cups:1.1.17 cpe:/a:apple:cups:1.1.18 cpe:/a:apple:cups:1.1.19 cpe:/a:apple:cups:1.1.19:rc1 cpe:/a:apple:cups:1.1.19:rc2 cpe:/a:apple:cups:1.1.19:rc3 cpe:/a:apple:cups:1.1.19:rc4 cpe:/a:apple:cups:1.1.19:rc5 cpe:/a:apple:cups:1.1.20 cpe:/a:apple:cups:1.1.20:rc1 cpe:/a:apple:cups:1.1.20:rc2 cpe:/a:apple:cups:1.1.20:rc3 cpe:/a:apple:cups:1.1.20:rc4 cpe:/a:apple:cups:1.1.20:rc5 cpe:/a:apple:cups:1.1.20:rc6 cpe:/a:apple:cups:1.1.21 cpe:/a:apple:cups:1.1.21:rc1 cpe:/a:apple:cups:1.1.21:rc2 cpe:/a:apple:cups:1.1.22 cpe:/a:apple:cups:1.1.22:rc1 cpe:/a:apple:cups:1.1.22:rc2 cpe:/a:apple:cups:1.1.23 cpe:/a:apple:cups:1.1.23:rc1 cpe:/a:apple:cups:1.2:b1 cpe:/a:apple:cups:1.2:b2 cpe:/a:apple:cups:1.2:rc1 cpe:/a:apple:cups:1.2:rc2 cpe:/a:apple:cups:1.2:rc3 cpe:/a:apple:cups:1.2.0 cpe:/a:apple:cups:1.2.1 cpe:/a:apple:cups:1.2.2 cpe:/a:apple:cups:1.2.3 cpe:/a:apple:cups:1.2.4 cpe:/a:apple:cups:1.2.5 cpe:/a:apple:cups:1.2.6 cpe:/a:apple:cups:1.2.7 cpe:/a:apple:cups:1.2.8 cpe:/a:apple:cups:1.2.9 cpe:/a:apple:cups:1.2.10 cpe:/a:apple:cups:1.2.11 cpe:/a:apple:cups:1.2.12 cpe:/a:apple:cups:1.3:b1 cpe:/a:apple:cups:1.3:rc1 cpe:/a:apple:cups:1.3:rc2 cpe:/a:apple:cups:1.3.0 cpe:/a:apple:cups:1.3.1 cpe:/a:apple:cups:1.3.2 cpe:/a:apple:cups:1.3.3 cpe:/a:apple:cups:1.3.4 cpe:/a:apple:cups:1.3.5 cpe:/a:apple:cups:1.3.6 cpe:/a:apple:cups:1.3.7 cpe:/a:apple:cups:1.3.8 cpe:/a:apple:cups:1.3.9 cpe:/a:apple:cups:1.3.10 cpe:/a:apple:cups:1.3.11 cpe:/a:apple:cups:1.4:b1 cpe:/a:apple:cups:1.4:b2 cpe:/a:apple:cups:1.4:b3 cpe:/a:apple:cups:1.4:rc1 cpe:/a:apple:cups:1.4.0 cpe:/a:apple:cups:1.4.1 cpe:/a:apple:cups:1.4.2 cpe:/a:apple:cups:1.4.3 cpe:/a:apple:cups:1.4.4 cpe:/a:apple:cups:1.4.5 cpe:/a:apple:cups:1.4.6 cpe:/a:apple:cups:1.4.7 cpe:/a:apple:cups:1.4.8 CVE-2011-3170 2011-08-19T13:55:03.363-04:00 2017-08-28T21:30:05.287-04:00 5.1 NETWORK HIGH NONE PARTIAL PARTIAL PARTIAL http://nvd.nist.gov 2011-08-22T09:37:00.000-04:00 SECTRACK 1025980 SECUNIA 45796 SECUNIA 46024 BID 49323 DEBIAN DSA-2354 GENTOO GLSA-201207-10 MANDRIVA MDVSA-2011:146 MANDRIVA MDVSA-2011:147 UBUNTU USN-1207-1 XF cups-gifreadlzw-function-bo(69380) CONFIRM http://cups.org/str.php?L3914 CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=727800 The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896.