The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThere is no fixed version for OpenPrinting/cups-filters.
Affected versions of this package are vulnerable to Out-of-bounds Read via the cfImageLut function when processing TIFF image files. An attacker can cause out-of-bounds memory access by submitting a crafted TIFF file as a print job and manipulating print job options to control the bytes-per-pixel value, leading to potential information disclosure or modification of memory.
Note:
This is only exploitable if the attacker can submit print jobs and select a printer configuration that invokes the imagetoraster filter or its C-function equivalent.