The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896.
cups.org/str.php?L3914
secunia.com/advisories/45796
secunia.com/advisories/46024
security.gentoo.org/glsa/glsa-201207-10.xml
www.debian.org/security/2011/dsa-2354
www.mandriva.com/security/advisories?name=MDVSA-2011:146
www.mandriva.com/security/advisories?name=MDVSA-2011:147
www.securityfocus.com/bid/49323
www.securitytracker.com/id?1025980
www.ubuntu.com/usn/USN-1207-1
bugzilla.redhat.com/show_bug.cgi?id=727800
exchange.xforce.ibmcloud.com/vulnerabilities/69380