Numeric Errors Affecting cups package, versions <1.3.5-1
Threat Intelligence
EPSS
43.79% (98th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-CUPS-364617
- published 19 Dec 2007
- disclosed 19 Dec 2007
Introduced: 19 Dec 2007
CVE-2007-5849 Open this link in a new tabHow to fix?
Upgrade Debian:9
cups
to version 1.3.5-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream cups
package and not the cups
package as distributed by Debian
.
See How to fix?
for Debian:9
relevant fixed versions and status.
Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) for CUPS 1.2 through 1.3.4 allows remote attackers to execute arbitrary code via a crafted SNMP response that triggers a stack-based buffer overflow.
References
- https://security-tracker.debian.org/tracker/CVE-2007-5849
- http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
- http://www.debian.org/security/2007/dsa-1437
- http://www.gentoo.org/security/en/glsa/glsa-200712-14.xml
- http://bugs.gentoo.org/show_bug.cgi?id=201570
- http://docs.info.apple.com/article.html?artnum=307179
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00908.html
- http://www.cups.org/str.php?L2589
- http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
- http://www.us-cert.gov/cas/techalerts/TA07-352A.html
- http://www.vupen.com/english/advisories/2007/4238
- http://www.vupen.com/english/advisories/2007/4242
- http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00003.html
- http://secunia.com/advisories/28113
- http://secunia.com/advisories/28129
- http://secunia.com/advisories/28136
- http://secunia.com/advisories/28200
- http://secunia.com/advisories/28386
- http://secunia.com/advisories/28441
- http://secunia.com/advisories/28636
- http://secunia.com/advisories/28676
- http://www.securityfocus.com/bid/26910
- http://www.securityfocus.com/bid/26917
- http://www.ubuntu.com/usn/usn-563-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39097
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39101
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:036
CVSS Scores
version 3.1