7 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
0.001 Low
EPSS
Percentile
42.4%
Due to failure in validating the length provided by an attacker-crafted PPD
PostScript document, CUPS and libppd are susceptible to a heap-based buffer
overflow and possibly code execution. This issue has been fixed in CUPS
version 2.4.7, released in September of 2023.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | cups | < 2.2.7-1ubuntu2.10+esm2 | UNKNOWN |
ubuntu | 20.04 | noarch | cups | < 2.3.1-9ubuntu1.6 | UNKNOWN |
ubuntu | 22.04 | noarch | cups | < 2.4.1op1-1ubuntu4.7 | UNKNOWN |
ubuntu | 23.04 | noarch | cups | < 2.4.2-3ubuntu2.5 | UNKNOWN |
ubuntu | 23.10 | noarch | cups | < 2.4.6-0ubuntu2 | UNKNOWN |
ubuntu | 24.04 | noarch | cups | < 2.4.6-0ubuntu2 | UNKNOWN |
ubuntu | 16.04 | noarch | cups | < 2.1.3-4ubuntu0.11+esm4 | UNKNOWN |
ubuntu | 18.04 | noarch | libppd | < any | UNKNOWN |
ubuntu | 20.04 | noarch | libppd | < any | UNKNOWN |
ubuntu | 22.04 | noarch | libppd | < any | UNKNOWN |
launchpad.net/bugs/cve/CVE-2023-4504
nvd.nist.gov/vuln/detail/CVE-2023-4504
security-tracker.debian.org/tracker/CVE-2023-4504
takeonme.org/cves/CVE-2023-4504.html
ubuntu.com/security/notices/USN-6391-1
ubuntu.com/security/notices/USN-6391-2
ubuntu.com/security/notices/USN-6392-1
www.cve.org/CVERecord?id=CVE-2023-4504