Out-of-bounds Write Affecting cups-devel package, versions <1:1.3.7-30.el5


Severity

Recommended
low

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
11.84% (96th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE5-CUPSDEVEL-2466154
  • published10 Apr 2022
  • disclosed19 Aug 2011

Introduced: 19 Aug 2011

CVE-2011-2896  (opens in a new tab)
CWE-787  (opens in a new tab)

How to fix?

Upgrade Oracle:5 cups-devel to version 1:1.3.7-30.el5 or higher.
This issue was patched in ELSA-2012-0302.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cups-devel package and not the cups-devel package as distributed by Oracle. See How to fix? for Oracle:5 relevant fixed versions and status.

The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.

References

CVSS Scores

version 3.1