Stack-based Buffer Overflow Affecting cpdb-libs package, versions <1.2.0-0ubuntu8.1.22.04.1


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
1.14% (85th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU2204-CPDBLIBS-5710772
  • published15 Jun 2023
  • disclosed14 Jun 2023

Introduced: 14 Jun 2023

CVE-2023-34095  (opens in a new tab)
CWE-121  (opens in a new tab)

How to fix?

Upgrade Ubuntu:22.04 cpdb-libs to version 1.2.0-0ubuntu8.1.22.04.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream cpdb-libs package and not the cpdb-libs package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

cpdb-libs provides frontend and backend libraries for the Common Printing Dialog Backends (CPDB) project. In versions 1.0 through 2.0b4, cpdb-libs is vulnerable to buffer overflows via improper use of scanf(3). cpdb-libs uses the fscanf() and scanf() functions to parse command lines and configuration files, dropping the read string components into fixed-length buffers, but does not limit the length of the strings to be read by fscanf() and scanf() causing buffer overflows when a string is longer than 1023 characters. A patch for this issue is available at commit f181bd1f14757c2ae0f17cc76dc20421a40f30b7. As all buffers have a length of 1024 characters, the patch limits the maximum string length to be read to 1023 by replacing all occurrences of %s with %1023s in all calls of the fscanf() and scanf() functions.

CVSS Scores

version 3.1