Stack-based Buffer Overflow Affecting cpdb-libs package, versions <1.2.0-3


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.92% (83rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-CPDBLIBS-5710331
  • published15 Jun 2023
  • disclosed14 Jun 2023

Introduced: 14 Jun 2023

CVE-2023-34095  (opens in a new tab)
CWE-121  (opens in a new tab)

How to fix?

Upgrade Debian:unstable cpdb-libs to version 1.2.0-3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cpdb-libs package and not the cpdb-libs package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

cpdb-libs provides frontend and backend libraries for the Common Printing Dialog Backends (CPDB) project. In versions 1.0 through 2.0b4, cpdb-libs is vulnerable to buffer overflows via improper use of scanf(3). cpdb-libs uses the fscanf() and scanf() functions to parse command lines and configuration files, dropping the read string components into fixed-length buffers, but does not limit the length of the strings to be read by fscanf() and scanf() causing buffer overflows when a string is longer than 1023 characters. A patch for this issue is available at commit f181bd1f14757c2ae0f17cc76dc20421a40f30b7. As all buffers have a length of 1024 characters, the patch limits the maximum string length to be read to 1023 by replacing all occurrences of %s with %1023s in all calls of the fscanf() and scanf() functions.

CVSS Scores

version 3.1