Lucene search

K
debianDebianDEBIAN:DSA-3172-1:C0A28
HistoryFeb 25, 2015 - 6:21 p.m.

[SECURITY] [DSA 3172-1] cups security update

2015-02-2518:21:04
lists.debian.org
12

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

5.9

Confidence

Low

EPSS

0.019

Percentile

88.5%


Debian Security Advisory DSA-3172-1 [email protected]
http://www.debian.org/security/ Sebastien Delafond
February 25, 2015 http://www.debian.org/security/faq


Package : cups
CVE ID : CVE-2014-9679
Debian Bug : 778387

Peter De Wachter discovered that CUPS, the Common UNIX Printing
System, did not correctly parse compressed raster files. By submitting
a specially crafted raster file, a remote attacker could use this
vulnerability to trigger a buffer overflow.

For the stable distribution (wheezy), this problem has been fixed in
version 1.5.3-5+deb7u5.

For the upcoming stable distribution (jessie) and unstable
distribution (sid), this problem has been fixed in version 1.7.5-11.

We recommend that you upgrade your cups packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

5.9

Confidence

Low

EPSS

0.019

Percentile

88.5%