Lucene search

K
debianDebianDEBIAN:DLA-159-1:19AEB
HistoryFeb 27, 2015 - 1:03 p.m.

[SECURITY] [DLA 159-1] cups security update

2015-02-2713:03:07
lists.debian.org
11

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.7

Confidence

High

EPSS

0.019

Percentile

88.5%

Package : cups
Version : 1.4.4-7+squeeze7
CVE ID : CVE-2014-9679
Debian Bug : #778387

Peter De Wachter discovered that CUPS, the Common UNIX Printing
System, did not correctly parse compressed raster files. By submitting
a specially crafted raster file, a remote attacker could use this
vulnerability to trigger a buffer overflow.

For the oldstable distribution (squeeze), this problem has been fixed in
version 1.4.4-7+squeeze7.

For the stable distribution (wheezy), this problem has been fixed in
version 1.5.3-5+deb7u5.

We recommend that you upgrade your cups packages.


Ben Hutchings - Debian developer, kernel team member
Attachment:
signature.asc
Description: This is a digitally signed message part

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.7

Confidence

High

EPSS

0.019

Percentile

88.5%