Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2002-1384
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:19
Severity ?
EPSS score ?
Summary
Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T03:19:28.818Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "DSA-232", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2003/dsa-232", }, { name: "RHSA-2002:295", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2002-295.html", }, { name: "MDKSA-2003:002", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:002", }, { name: "SUSE-SA:2003:002", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://www.novell.com/linux/security/advisories/2003_002_cups.html", }, { name: "6475", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/6475", }, { name: "MDKSA-2003:001", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred", ], url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001", }, { name: "GLSA-200301-1", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "http://marc.info/?l=bugtraq&m=104152282309980&w=2", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.idefense.com/advisory/12.23.02.txt", }, { name: "RHSA-2002:307", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2002-307.html", }, { name: "pdftops-integer-overflow(10937)", tags: [ "vdb-entry", "x_refsource_XF", "x_transferred", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10937", }, { name: "RHSA-2003:216", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2003-216.html", }, { name: "DSA-226", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2003/dsa-226", }, { name: "RHSA-2003:037", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://www.redhat.com/support/errata/RHSA-2003-037.html", }, { name: "DSA-222", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2003/dsa-222", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2002-12-23T00:00:00", descriptions: [ { lang: "en", value: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2007-12-20T00:00:00", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "DSA-232", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2003/dsa-232", }, { name: "RHSA-2002:295", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2002-295.html", }, { name: "MDKSA-2003:002", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:002", }, { name: "SUSE-SA:2003:002", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://www.novell.com/linux/security/advisories/2003_002_cups.html", }, { name: "6475", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/6475", }, { name: "MDKSA-2003:001", tags: [ "vendor-advisory", "x_refsource_MANDRAKE", ], url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001", }, { name: "GLSA-200301-1", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "http://marc.info/?l=bugtraq&m=104152282309980&w=2", }, { tags: [ "x_refsource_MISC", ], url: "http://www.idefense.com/advisory/12.23.02.txt", }, { name: "RHSA-2002:307", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2002-307.html", }, { name: "pdftops-integer-overflow(10937)", tags: [ "vdb-entry", "x_refsource_XF", ], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10937", }, { name: "RHSA-2003:216", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2003-216.html", }, { name: "DSA-226", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2003/dsa-226", }, { name: "RHSA-2003:037", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://www.redhat.com/support/errata/RHSA-2003-037.html", }, { name: "DSA-222", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2003/dsa-222", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2002-1384", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-232", refsource: "DEBIAN", url: "http://www.debian.org/security/2003/dsa-232", }, { name: "RHSA-2002:295", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2002-295.html", }, { name: "MDKSA-2003:002", refsource: "MANDRAKE", url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:002", }, { name: "SUSE-SA:2003:002", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2003_002_cups.html", }, { name: "6475", refsource: "BID", url: "http://www.securityfocus.com/bid/6475", }, { name: "MDKSA-2003:001", refsource: "MANDRAKE", url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001", }, { name: "GLSA-200301-1", refsource: "GENTOO", url: "http://marc.info/?l=bugtraq&m=104152282309980&w=2", }, { name: "http://www.idefense.com/advisory/12.23.02.txt", refsource: "MISC", url: "http://www.idefense.com/advisory/12.23.02.txt", }, { name: "RHSA-2002:307", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2002-307.html", }, { name: "pdftops-integer-overflow(10937)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10937", }, { name: "RHSA-2003:216", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2003-216.html", }, { name: "DSA-226", refsource: "DEBIAN", url: "http://www.debian.org/security/2003/dsa-226", }, { name: "RHSA-2003:037", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2003-037.html", }, { name: "DSA-222", refsource: "DEBIAN", url: "http://www.debian.org/security/2003/dsa-222", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2002-1384", datePublished: "2004-09-01T04:00:00", dateReserved: "2002-12-18T00:00:00", dateUpdated: "2024-08-08T03:19:28.818Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { fkie_nvd: { configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"68BD578F-CCAD-4515-9205-EB4F297C6DB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3182CA2-7375-43BC-A0E5-DE11D4B65EE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCF4C8D0-3030-4DD5-800B-76A582A4CD0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"734D0C2C-F71F-461A-87EE-202C6B706753\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F0F402D-5CD0-4477-8B59-C753CECB02BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"959F7AFA-ED20-434C-993F-06C2A8574662\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4F5A0A4-2884-46CA-A846-8B954EB80CFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35E65857-12C7-49DE-AD27-3CACD456231C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47CEF035-57A6-470B-916A-E5562C28E866\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D414984E-4F6B-4278-8346-968587E4B18E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33C36DCB-2FDD-44E6-85E8-875575AAE69E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28CC6233-E207-40CC-81FF-A8670EEA4295\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B95DA7DE-B786-4EE7-A3F4-C077A7986D5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5306C05-4A71-4175-8C22-F2DE0F2FE4C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"354487CF-0086-4AE2-872B-0032E3EB89EE\"}]}]}]", descriptions: "[{\"lang\": \"en\", \"value\": \"Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.\"}, {\"lang\": \"es\", \"value\": \"Desbordamiento de enteros en pdftops, usado en Xpdf 2.01 y anteriores, y CUPS antes de 1.1.18, permite a usuarios locales ejecutar c\\u00f3digo arbitrario mediante una entrada ColorSpace con un n\\u00famero de elementos largo, como ha sido demostrado por cups-pdf.\"}]", id: "CVE-2002-1384", lastModified: "2024-11-20T23:41:10.867", metrics: "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": true, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", published: "2003-01-02T05:00:00.000", references: "[{\"url\": \"http://marc.info/?l=bugtraq&m=104152282309980&w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2003/dsa-222\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2003/dsa-226\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2003/dsa-232\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.idefense.com/advisory/12.23.02.txt\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:002\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2003_002_cups.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2002-295.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2002-307.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2003-037.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2003-216.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/6475\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/10937\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=bugtraq&m=104152282309980&w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2003/dsa-222\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2003/dsa-226\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2003/dsa-232\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.idefense.com/advisory/12.23.02.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:002\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2003_002_cups.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2002-295.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2002-307.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2003-037.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2003-216.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/6475\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/10937\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]", }, nvd: "{\"cve\":{\"id\":\"CVE-2002-1384\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2003-01-02T05:00:00.000\",\"lastModified\":\"2024-11-20T23:41:10.867\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de enteros en pdftops, usado en Xpdf 2.01 y anteriores, y CUPS antes de 1.1.18, permite a usuarios locales ejecutar código arbitrario mediante una entrada ColorSpace con un número de elementos largo, como ha sido demostrado por cups-pdf.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68BD578F-CCAD-4515-9205-EB4F297C6DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3182CA2-7375-43BC-A0E5-DE11D4B65EE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCF4C8D0-3030-4DD5-800B-76A582A4CD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"734D0C2C-F71F-461A-87EE-202C6B706753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F0F402D-5CD0-4477-8B59-C753CECB02BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"959F7AFA-ED20-434C-993F-06C2A8574662\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4F5A0A4-2884-46CA-A846-8B954EB80CFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35E65857-12C7-49DE-AD27-3CACD456231C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47CEF035-57A6-470B-916A-E5562C28E866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D414984E-4F6B-4278-8346-968587E4B18E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C36DCB-2FDD-44E6-85E8-875575AAE69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28CC6233-E207-40CC-81FF-A8670EEA4295\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B95DA7DE-B786-4EE7-A3F4-C077A7986D5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5306C05-4A71-4175-8C22-F2DE0F2FE4C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"354487CF-0086-4AE2-872B-0032E3EB89EE\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=bugtraq&m=104152282309980&w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-222\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-226\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-232\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.idefense.com/advisory/12.23.02.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:002\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2003_002_cups.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2002-295.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2002-307.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-037.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-216.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/6475\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/10937\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq&m=104152282309980&w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-222\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-226\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-232\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.idefense.com/advisory/12.23.02.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2003_002_cups.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2002-295.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2002-307.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-216.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/6475\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/10937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", }, }
ghsa-9542-fgmx-fggg
Vulnerability from github
Published
2022-04-30 18:21
Modified
2022-04-30 18:21
Details
Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.
{ affected: [], aliases: [ "CVE-2002-1384", ], database_specific: { cwe_ids: [], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2003-01-02T05:00:00Z", severity: "HIGH", }, details: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", id: "GHSA-9542-fgmx-fggg", modified: "2022-04-30T18:21:04Z", published: "2022-04-30T18:21:03Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", }, { type: "WEB", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10937", }, { type: "WEB", url: "http://marc.info/?l=bugtraq&m=104152282309980&w=2", }, { type: "WEB", url: "http://www.debian.org/security/2003/dsa-222", }, { type: "WEB", url: "http://www.debian.org/security/2003/dsa-226", }, { type: "WEB", url: "http://www.debian.org/security/2003/dsa-232", }, { type: "WEB", url: "http://www.idefense.com/advisory/12.23.02.txt", }, { type: "WEB", url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001", }, { type: "WEB", url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:002", }, { type: "WEB", url: "http://www.novell.com/linux/security/advisories/2003_002_cups.html", }, { type: "WEB", url: "http://www.redhat.com/support/errata/RHSA-2002-295.html", }, { type: "WEB", url: "http://www.redhat.com/support/errata/RHSA-2002-307.html", }, { type: "WEB", url: "http://www.redhat.com/support/errata/RHSA-2003-037.html", }, { type: "WEB", url: "http://www.redhat.com/support/errata/RHSA-2003-216.html", }, { type: "WEB", url: "http://www.securityfocus.com/bid/6475", }, ], schema_version: "1.4.0", severity: [], }
rhsa-2002:307
Vulnerability from csaf_redhat
Published
2003-01-30 19:29
Modified
2024-11-21 22:34
Summary
Red Hat Security Advisory: xpdf security update
Notes
Topic
Updated Xpdf packages are available to fix a vulnerability where a
malicious PDF document could run arbitrary code.
[Updated 06 Feb 2003]
Added fixed packages for Advanced Workstation 2.1
Details
Xpdf is an X Window System based viewer for Portable Document Format
(PDF) files.
During an audit of CUPS, a printing system, Zen Parsec found an integer
overflow vulnerability in the pdftops filter. Since the code for pdftops
is taken from the Xpdf project, all versions of Xpdf including 2.01 are
also vulnerable to this issue. An attacker could create a malicious PDF
file that would execute arbitrary code as the user who used Xpdf to view it.
All users of Xpdf are advised to upgrade to these errata packages which
contain a patch to correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated Xpdf packages are available to fix a vulnerability where a\nmalicious PDF document could run arbitrary code.\n\n[Updated 06 Feb 2003]\nAdded fixed packages for Advanced Workstation 2.1", title: "Topic", }, { category: "general", text: "Xpdf is an X Window System based viewer for Portable Document Format\n(PDF) files.\n\nDuring an audit of CUPS, a printing system, Zen Parsec found an integer\noverflow vulnerability in the pdftops filter. Since the code for pdftops\nis taken from the Xpdf project, all versions of Xpdf including 2.01 are\nalso vulnerable to this issue. An attacker could create a malicious PDF\nfile that would execute arbitrary code as the user who used Xpdf to view it.\n\nAll users of Xpdf are advised to upgrade to these errata packages which\ncontain a patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2002:307", url: "https://access.redhat.com/errata/RHSA-2002:307", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2002_307.json", }, ], title: "Red Hat Security Advisory: xpdf security update", tracking: { current_release_date: "2024-11-21T22:34:25+00:00", generator: { date: "2024-11-21T22:34:25+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2002:307", initial_release_date: "2003-01-30T19:29:00+00:00", revision_history: [ { date: "2003-01-30T19:29:00+00:00", number: "1", summary: "Initial version", }, { date: "2003-02-07T00:00:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-21T22:34:25+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product: { name: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::as", }, }, }, { category: "product_name", name: "Red Hat Linux Advanced Workstation 2.1", product: { name: "Red Hat Linux Advanced Workstation 2.1", product_id: "Red Hat Linux Advanced Workstation 2.1", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::aw", }, }, }, ], category: "product_family", name: "Red Hat Advanced Products", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2002-1384", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616903", }, ], notes: [ { category: "description", text: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1384", }, { category: "external", summary: "RHBZ#1616903", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616903", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1384", url: "https://www.cve.org/CVERecord?id=CVE-2002-1384", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", }, ], release_date: "2002-12-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-30T19:29:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:307", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, ], }
RHSA-2003:216
Vulnerability from csaf_redhat
Published
2003-06-30 22:36
Modified
2024-11-21 22:46
Summary
Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability
Notes
Topic
Updated Xpdf packages are available that fix a vulnerability where a
malicious PDF document could run arbitrary code.
Details
Xpdf is an X Window System based viewer for Portable Document Format (PDF)
files.
During an audit of CUPS, a printing system, Zen Parsec found an integer
overflow vulnerability in the pdftops filter. Since the code for pdftops is
taken from the Xpdf project, all versions of Xpdf including 2.01 are also
vulnerable to this issue. An attacker could create a PDF file that could
execute arbitrary code. This code would have the same access privileges as
the user who viewed the file with Xpdf.
Martyn Gilmore discovered a flaw in various PDF viewers and readers. An
attacker can embed malicious external-type hyperlinks that, if activated or
followed by a victim, can execute arbitrary shell commands. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0434 to this issue.
All users of Xpdf are advised to upgrade to these erratum packages, which
contain a patch correcting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated Xpdf packages are available that fix a vulnerability where a\nmalicious PDF document could run arbitrary code.", title: "Topic", }, { category: "general", text: "Xpdf is an X Window System based viewer for Portable Document Format (PDF)\nfiles.\n\nDuring an audit of CUPS, a printing system, Zen Parsec found an integer\noverflow vulnerability in the pdftops filter. Since the code for pdftops is\ntaken from the Xpdf project, all versions of Xpdf including 2.01 are also\nvulnerable to this issue. An attacker could create a PDF file that could\nexecute arbitrary code. This code would have the same access privileges as\nthe user who viewed the file with Xpdf.\n\nMartyn Gilmore discovered a flaw in various PDF viewers and readers. An\nattacker can embed malicious external-type hyperlinks that, if activated or\nfollowed by a victim, can execute arbitrary shell commands. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2003-0434 to this issue.\n\nAll users of Xpdf are advised to upgrade to these erratum packages, which\ncontain a patch correcting this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2003:216", url: "https://access.redhat.com/errata/RHSA-2003:216", }, { category: "external", summary: "http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html", url: "http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_216.json", }, ], title: "Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability", tracking: { current_release_date: "2024-11-21T22:46:41+00:00", generator: { date: "2024-11-21T22:46:41+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2003:216", initial_release_date: "2003-06-30T22:36:00+00:00", revision_history: [ { date: "2003-06-30T22:36:00+00:00", number: "1", summary: "Initial version", }, { date: "2003-06-30T00:00:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-21T22:46:41+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Linux 7.1", product: { name: "Red Hat Linux 7.1", product_id: "Red Hat Linux 7.1", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.1", }, }, }, ], category: "product_family", name: "Red Hat Linux", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2002-1384", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616903", }, ], notes: [ { category: "description", text: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.1", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1384", }, { category: "external", summary: "RHBZ#1616903", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616903", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1384", url: "https://www.cve.org/CVERecord?id=CVE-2002-1384", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", }, ], release_date: "2002-12-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-06-30T22:36:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.1", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2003:216", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, { cve: "CVE-2003-0434", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1617032", }, ], notes: [ { category: "description", text: "Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.1", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2003-0434", }, { category: "external", summary: "RHBZ#1617032", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1617032", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2003-0434", url: "https://www.cve.org/CVERecord?id=CVE-2003-0434", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2003-0434", url: "https://nvd.nist.gov/vuln/detail/CVE-2003-0434", }, ], release_date: "2003-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-06-30T22:36:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.1", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2003:216", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, ], }
rhsa-2002:295
Vulnerability from csaf_redhat
Published
2003-01-13 15:34
Modified
2025-01-16 18:55
Summary
Red Hat Security Advisory: : Updated CUPS packages fix various vulnerabilities
Notes
Topic
Updated CUPS packages are available for Red Hat Linux 7.3 and 8.0 which fix
various security issues.
Details
The Common UNIX Printing System (CUPS) provides a portable printing
layer. A number of vulnerabilities have been discovered in CUPS.
CUPS was distributed with Red Hat Linux 7.3 and 8.0 but is not
installed by default.
1. An integer overflow exists in the CUPS HTTP interface that allows
a local attacker to gain the permissions of the 'lp' user. (CAN-2002-1383)
2. A race condition exists in the creation of a pid file which allows
an attacker who already has privileges of the 'lp' user (for example from
utilizing a different exploit) to create or overwrite any file as
root, leading to arbitrary code execution. (CAN-2002-1366)
3. It is possible to remotely add a printer to CUPS by sending a
specially crafted UDP packet. If an attacker utilizes this vulnerability,
they could add a printer with a tainted name that if clicked on in the
web administration interface could be used to exploit other
vulnerabilities. (CAN-2002-1367)
By utilizing this vulnerability, an attacker could take a number of steps
to be able to get hold of the certificate used to access the administrative
section of the CUPS server and potentially add a printer that will execute
commands with root privileges.
4. Problems with chunked encoding and negative content length handling
in the CUPS HTTP interface can cause CUPS to crash. On Red Hat Linux
platforms this can cause a denial of service (DoS) against CUPS.
(CAN-2002-1368)
5. A number of integer overflows exist in the image handling code of
the filters in CUPS. In addition, CUPS does not properly check for
zero width GIF images. These vulnerabilities allow an attacker who has
the ability to print to run arbitrary code as the 'lp' user. (CAN-2002-1371)
6. An integer overflow exists in the CUPS pdftops filter. This can be
exploited by an attacker who is able to print sending a carefully
crafted PDF file which can execute arbitrary commands as the 'lp' user.
(CAN-2002-1384)
7. A buffer overflow exists in setting up the job management options.
When combined with other vulnerabilities, this could allow a local user
to gain root privileges. This issue only affects the version of CUPS
shipped with Red Hat Linux 7.3. (CAN-2002-1369)
8. A bug in the select() call would allow an easy DoS attack which would
cause CUPS to not recover once the DoS has stopped. (CAN-2002-1372)
Red Hat Linux 7.3 and 8.0 were shipped with versions of CUPS that are
vulnerable to these issues. All users of CUPS are advised to upgrade to the
erratum packages which contain a patch to correct these issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated CUPS packages are available for Red Hat Linux 7.3 and 8.0 which fix\nvarious security issues.", title: "Topic", }, { category: "general", text: "The Common UNIX Printing System (CUPS) provides a portable printing\nlayer. A number of vulnerabilities have been discovered in CUPS.\n\nCUPS was distributed with Red Hat Linux 7.3 and 8.0 but is not\ninstalled by default.\n\n1. An integer overflow exists in the CUPS HTTP interface that allows\na local attacker to gain the permissions of the 'lp' user. (CAN-2002-1383)\n\n2. A race condition exists in the creation of a pid file which allows\nan attacker who already has privileges of the 'lp' user (for example from\nutilizing a different exploit) to create or overwrite any file as\nroot, leading to arbitrary code execution. (CAN-2002-1366)\n\n3. It is possible to remotely add a printer to CUPS by sending a\nspecially crafted UDP packet. If an attacker utilizes this vulnerability,\nthey could add a printer with a tainted name that if clicked on in the\nweb administration interface could be used to exploit other\nvulnerabilities. (CAN-2002-1367)\n\nBy utilizing this vulnerability, an attacker could take a number of steps\nto be able to get hold of the certificate used to access the administrative\nsection of the CUPS server and potentially add a printer that will execute\ncommands with root privileges.\n\n4. Problems with chunked encoding and negative content length handling\nin the CUPS HTTP interface can cause CUPS to crash. On Red Hat Linux\nplatforms this can cause a denial of service (DoS) against CUPS. \n(CAN-2002-1368)\n\n5. A number of integer overflows exist in the image handling code of\nthe filters in CUPS. In addition, CUPS does not properly check for\nzero width GIF images. These vulnerabilities allow an attacker who has\nthe ability to print to run arbitrary code as the 'lp' user. (CAN-2002-1371)\n\n6. An integer overflow exists in the CUPS pdftops filter. This can be\nexploited by an attacker who is able to print sending a carefully\ncrafted PDF file which can execute arbitrary commands as the 'lp' user.\n(CAN-2002-1384)\n\n7. A buffer overflow exists in setting up the job management options.\nWhen combined with other vulnerabilities, this could allow a local user\nto gain root privileges. This issue only affects the version of CUPS\nshipped with Red Hat Linux 7.3. (CAN-2002-1369)\n\n8. A bug in the select() call would allow an easy DoS attack which would\ncause CUPS to not recover once the DoS has stopped. (CAN-2002-1372)\n\nRed Hat Linux 7.3 and 8.0 were shipped with versions of CUPS that are\nvulnerable to these issues. All users of CUPS are advised to upgrade to the\nerratum packages which contain a patch to correct these issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2002:295", url: "https://access.redhat.com/errata/RHSA-2002:295", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2002_295.json", }, ], title: "Red Hat Security Advisory: : Updated CUPS packages fix various vulnerabilities", tracking: { current_release_date: "2025-01-16T18:55:44+00:00", generator: { date: "2025-01-16T18:55:44+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.6", }, }, id: "RHSA-2002:295", initial_release_date: "2003-01-13T15:34:00+00:00", revision_history: [ { date: "2003-01-13T15:34:00+00:00", number: "1", summary: "Initial version", }, { date: "2003-02-07T00:00:00+00:00", number: "2", summary: "Last updated version", }, { date: "2025-01-16T18:55:44+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Linux 7.3", product: { name: "Red Hat Linux 7.3", product_id: "Red Hat Linux 7.3", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.3", }, }, }, { category: "product_name", name: "Red Hat Linux 8.0", product: { name: "Red Hat Linux 8.0", product_id: "Red Hat Linux 8.0", product_identification_helper: { cpe: "cpe:/o:redhat:linux:8.0", }, }, }, ], category: "product_family", name: "Red Hat Linux", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2002-1366", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616888", }, ], notes: [ { category: "description", text: "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows local users with lp privileges to create or overwrite arbitrary files via file race conditions, as demonstrated by ice-cream.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1366", }, { category: "external", summary: "RHBZ#1616888", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616888", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1366", url: "https://www.cve.org/CVERecord?id=CVE-2002-1366", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1366", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1366", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1367", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616889", }, ], notes: [ { category: "description", text: "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to add printers without authentication via a certain UDP packet, which can then be used to perform unauthorized activities such as stealing the local root certificate for the administration server via a \"need authorization\" page, as demonstrated by new-coke.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1367", }, { category: "external", summary: "RHBZ#1616889", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616889", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1367", url: "https://www.cve.org/CVERecord?id=CVE-2002-1367", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1367", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1367", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1368", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616890", }, ], notes: [ { category: "description", text: "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing negative arguments to be fed into memcpy() calls via HTTP requests with (1) a negative Content-Length value or (2) a negative length in a chunked transfer encoding.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1368", }, { category: "external", summary: "RHBZ#1616890", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616890", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1368", url: "https://www.cve.org/CVERecord?id=CVE-2002-1368", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1368", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1368", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1369", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616891", }, ], notes: [ { category: "description", text: "jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1369", }, { category: "external", summary: "RHBZ#1616891", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616891", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1369", url: "https://www.cve.org/CVERecord?id=CVE-2002-1369", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1369", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1369", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1371", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616892", }, ], notes: [ { category: "description", text: "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1371", }, { category: "external", summary: "RHBZ#1616892", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616892", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1371", url: "https://www.cve.org/CVERecord?id=CVE-2002-1371", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1371", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1371", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1372", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616893", }, ], notes: [ { category: "description", text: "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check the return values of various file and socket operations, which could allow a remote attacker to cause a denial of service (resource exhaustion) by causing file descriptors to be assigned and not released, as demonstrated by fanta.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1372", }, { category: "external", summary: "RHBZ#1616893", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616893", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1372", url: "https://www.cve.org/CVERecord?id=CVE-2002-1372", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1372", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1372", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, { cve: "CVE-2002-1383", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616902", }, ], notes: [ { category: "description", text: "Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1383", }, { category: "external", summary: "RHBZ#1616902", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616902", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1383", url: "https://www.cve.org/CVERecord?id=CVE-2002-1383", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1383", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1383", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1384", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616903", }, ], notes: [ { category: "description", text: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1384", }, { category: "external", summary: "RHBZ#1616903", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616903", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1384", url: "https://www.cve.org/CVERecord?id=CVE-2002-1384", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", }, ], release_date: "2002-12-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, ], }
rhsa-2002_295
Vulnerability from csaf_redhat
Published
2003-01-13 15:34
Modified
2024-11-21 22:34
Summary
Red Hat Security Advisory: : Updated CUPS packages fix various vulnerabilities
Notes
Topic
Updated CUPS packages are available for Red Hat Linux 7.3 and 8.0 which fix
various security issues.
Details
The Common UNIX Printing System (CUPS) provides a portable printing
layer. A number of vulnerabilities have been discovered in CUPS.
CUPS was distributed with Red Hat Linux 7.3 and 8.0 but is not
installed by default.
1. An integer overflow exists in the CUPS HTTP interface that allows
a local attacker to gain the permissions of the 'lp' user. (CAN-2002-1383)
2. A race condition exists in the creation of a pid file which allows
an attacker who already has privileges of the 'lp' user (for example from
utilizing a different exploit) to create or overwrite any file as
root, leading to arbitrary code execution. (CAN-2002-1366)
3. It is possible to remotely add a printer to CUPS by sending a
specially crafted UDP packet. If an attacker utilizes this vulnerability,
they could add a printer with a tainted name that if clicked on in the
web administration interface could be used to exploit other
vulnerabilities. (CAN-2002-1367)
By utilizing this vulnerability, an attacker could take a number of steps
to be able to get hold of the certificate used to access the administrative
section of the CUPS server and potentially add a printer that will execute
commands with root privileges.
4. Problems with chunked encoding and negative content length handling
in the CUPS HTTP interface can cause CUPS to crash. On Red Hat Linux
platforms this can cause a denial of service (DoS) against CUPS.
(CAN-2002-1368)
5. A number of integer overflows exist in the image handling code of
the filters in CUPS. In addition, CUPS does not properly check for
zero width GIF images. These vulnerabilities allow an attacker who has
the ability to print to run arbitrary code as the 'lp' user. (CAN-2002-1371)
6. An integer overflow exists in the CUPS pdftops filter. This can be
exploited by an attacker who is able to print sending a carefully
crafted PDF file which can execute arbitrary commands as the 'lp' user.
(CAN-2002-1384)
7. A buffer overflow exists in setting up the job management options.
When combined with other vulnerabilities, this could allow a local user
to gain root privileges. This issue only affects the version of CUPS
shipped with Red Hat Linux 7.3. (CAN-2002-1369)
8. A bug in the select() call would allow an easy DoS attack which would
cause CUPS to not recover once the DoS has stopped. (CAN-2002-1372)
Red Hat Linux 7.3 and 8.0 were shipped with versions of CUPS that are
vulnerable to these issues. All users of CUPS are advised to upgrade to the
erratum packages which contain a patch to correct these issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated CUPS packages are available for Red Hat Linux 7.3 and 8.0 which fix\nvarious security issues.", title: "Topic", }, { category: "general", text: "The Common UNIX Printing System (CUPS) provides a portable printing\nlayer. A number of vulnerabilities have been discovered in CUPS.\n\nCUPS was distributed with Red Hat Linux 7.3 and 8.0 but is not\ninstalled by default.\n\n1. An integer overflow exists in the CUPS HTTP interface that allows\na local attacker to gain the permissions of the 'lp' user. (CAN-2002-1383)\n\n2. A race condition exists in the creation of a pid file which allows\nan attacker who already has privileges of the 'lp' user (for example from\nutilizing a different exploit) to create or overwrite any file as\nroot, leading to arbitrary code execution. (CAN-2002-1366)\n\n3. It is possible to remotely add a printer to CUPS by sending a\nspecially crafted UDP packet. If an attacker utilizes this vulnerability,\nthey could add a printer with a tainted name that if clicked on in the\nweb administration interface could be used to exploit other\nvulnerabilities. (CAN-2002-1367)\n\nBy utilizing this vulnerability, an attacker could take a number of steps\nto be able to get hold of the certificate used to access the administrative\nsection of the CUPS server and potentially add a printer that will execute\ncommands with root privileges.\n\n4. Problems with chunked encoding and negative content length handling\nin the CUPS HTTP interface can cause CUPS to crash. On Red Hat Linux\nplatforms this can cause a denial of service (DoS) against CUPS. \n(CAN-2002-1368)\n\n5. A number of integer overflows exist in the image handling code of\nthe filters in CUPS. In addition, CUPS does not properly check for\nzero width GIF images. These vulnerabilities allow an attacker who has\nthe ability to print to run arbitrary code as the 'lp' user. (CAN-2002-1371)\n\n6. An integer overflow exists in the CUPS pdftops filter. This can be\nexploited by an attacker who is able to print sending a carefully\ncrafted PDF file which can execute arbitrary commands as the 'lp' user.\n(CAN-2002-1384)\n\n7. A buffer overflow exists in setting up the job management options.\nWhen combined with other vulnerabilities, this could allow a local user\nto gain root privileges. This issue only affects the version of CUPS\nshipped with Red Hat Linux 7.3. (CAN-2002-1369)\n\n8. A bug in the select() call would allow an easy DoS attack which would\ncause CUPS to not recover once the DoS has stopped. (CAN-2002-1372)\n\nRed Hat Linux 7.3 and 8.0 were shipped with versions of CUPS that are\nvulnerable to these issues. All users of CUPS are advised to upgrade to the\nerratum packages which contain a patch to correct these issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2002:295", url: "https://access.redhat.com/errata/RHSA-2002:295", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2002_295.json", }, ], title: "Red Hat Security Advisory: : Updated CUPS packages fix various vulnerabilities", tracking: { current_release_date: "2024-11-21T22:34:21+00:00", generator: { date: "2024-11-21T22:34:21+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2002:295", initial_release_date: "2003-01-13T15:34:00+00:00", revision_history: [ { date: "2003-01-13T15:34:00+00:00", number: "1", summary: "Initial version", }, { date: "2003-02-07T00:00:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-21T22:34:21+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Linux 7.3", product: { name: "Red Hat Linux 7.3", product_id: "Red Hat Linux 7.3", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.3", }, }, }, { category: "product_name", name: "Red Hat Linux 8.0", product: { name: "Red Hat Linux 8.0", product_id: "Red Hat Linux 8.0", product_identification_helper: { cpe: "cpe:/o:redhat:linux:8.0", }, }, }, ], category: "product_family", name: "Red Hat Linux", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2002-1366", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616888", }, ], notes: [ { category: "description", text: "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows local users with lp privileges to create or overwrite arbitrary files via file race conditions, as demonstrated by ice-cream.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1366", }, { category: "external", summary: "RHBZ#1616888", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616888", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1366", url: "https://www.cve.org/CVERecord?id=CVE-2002-1366", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1366", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1366", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1367", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616889", }, ], notes: [ { category: "description", text: "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to add printers without authentication via a certain UDP packet, which can then be used to perform unauthorized activities such as stealing the local root certificate for the administration server via a \"need authorization\" page, as demonstrated by new-coke.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1367", }, { category: "external", summary: "RHBZ#1616889", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616889", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1367", url: "https://www.cve.org/CVERecord?id=CVE-2002-1367", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1367", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1367", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1368", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616890", }, ], notes: [ { category: "description", text: "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing negative arguments to be fed into memcpy() calls via HTTP requests with (1) a negative Content-Length value or (2) a negative length in a chunked transfer encoding.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1368", }, { category: "external", summary: "RHBZ#1616890", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616890", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1368", url: "https://www.cve.org/CVERecord?id=CVE-2002-1368", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1368", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1368", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1369", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616891", }, ], notes: [ { category: "description", text: "jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1369", }, { category: "external", summary: "RHBZ#1616891", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616891", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1369", url: "https://www.cve.org/CVERecord?id=CVE-2002-1369", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1369", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1369", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1371", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616892", }, ], notes: [ { category: "description", text: "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1371", }, { category: "external", summary: "RHBZ#1616892", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616892", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1371", url: "https://www.cve.org/CVERecord?id=CVE-2002-1371", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1371", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1371", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1372", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616893", }, ], notes: [ { category: "description", text: "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check the return values of various file and socket operations, which could allow a remote attacker to cause a denial of service (resource exhaustion) by causing file descriptors to be assigned and not released, as demonstrated by fanta.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1372", }, { category: "external", summary: "RHBZ#1616893", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616893", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1372", url: "https://www.cve.org/CVERecord?id=CVE-2002-1372", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1372", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1372", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1383", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616902", }, ], notes: [ { category: "description", text: "Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1383", }, { category: "external", summary: "RHBZ#1616902", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616902", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1383", url: "https://www.cve.org/CVERecord?id=CVE-2002-1383", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1383", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1383", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1384", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616903", }, ], notes: [ { category: "description", text: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1384", }, { category: "external", summary: "RHBZ#1616903", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616903", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1384", url: "https://www.cve.org/CVERecord?id=CVE-2002-1384", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", }, ], release_date: "2002-12-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, ], }
rhsa-2003_037
Vulnerability from csaf_redhat
Published
2003-02-06 15:03
Modified
2024-11-21 22:34
Summary
Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability
Notes
Topic
Updated Xpdf packages are now available that fix a vulnerability in which a
maliciously-crafted pdf document could run arbitrary code.
[Updated 16 April 2003]
Added packages for Red Hat Linux on IBM iSeries and pSeries systems.
Details
Xpdf is a viewer for Portable Document Format (PDF) files.
During an audit of CUPS, a printing system, Zen Parsec found an integer
overflow vulnerability in the pdftops filter. Since the code for pdftops
is taken from the Xpdf project, all versions of Xpdf including 2.01 are
also vulnerable to this issue. An attacker could create a PDF
file that could execute arbitrary code. This could would have the same
access privileges as the user who viewed the file with Xpdf.
All users of Xpdf are advised to upgrade to these erratum packages. For
Red Hat Linux 8.0 we have included new packages based on Xpdf 1.01 with a
patch to correct this issue. For Red Hat Linux 7.0, 7.1, 7.2, and 7.3 we
have upgraded Xpdf to version 1.00 with a patch to correct this issue. For
Red Hat Linux 6.2 we have upgraded Xpdf to version 0.92 with a patch to
correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated Xpdf packages are now available that fix a vulnerability in which a\nmaliciously-crafted pdf document could run arbitrary code.\n\n[Updated 16 April 2003]\nAdded packages for Red Hat Linux on IBM iSeries and pSeries systems.", title: "Topic", }, { category: "general", text: "Xpdf is a viewer for Portable Document Format (PDF) files.\n\nDuring an audit of CUPS, a printing system, Zen Parsec found an integer\noverflow vulnerability in the pdftops filter. Since the code for pdftops\nis taken from the Xpdf project, all versions of Xpdf including 2.01 are\nalso vulnerable to this issue. An attacker could create a PDF\nfile that could execute arbitrary code. This could would have the same\naccess privileges as the user who viewed the file with Xpdf.\n\nAll users of Xpdf are advised to upgrade to these erratum packages. For\nRed Hat Linux 8.0 we have included new packages based on Xpdf 1.01 with a\npatch to correct this issue. For Red Hat Linux 7.0, 7.1, 7.2, and 7.3 we\nhave upgraded Xpdf to version 1.00 with a patch to correct this issue. For\nRed Hat Linux 6.2 we have upgraded Xpdf to version 0.92 with a patch to\ncorrect this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2003:037", url: "https://access.redhat.com/errata/RHSA-2003:037", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_037.json", }, ], title: "Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability", tracking: { current_release_date: "2024-11-21T22:34:29+00:00", generator: { date: "2024-11-21T22:34:29+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2003:037", initial_release_date: "2003-02-06T15:03:00+00:00", revision_history: [ { date: "2003-02-06T15:03:00+00:00", number: "1", summary: "Initial version", }, { date: "2003-02-06T00:00:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-21T22:34:29+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Linux 6.2", product: { name: "Red Hat Linux 6.2", product_id: "Red Hat Linux 6.2", product_identification_helper: { cpe: "cpe:/o:redhat:linux:6.2", }, }, }, { category: "product_name", name: "Red Hat Linux 7.0", product: { name: "Red Hat Linux 7.0", product_id: "Red Hat Linux 7.0", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.0", }, }, }, { category: "product_name", name: "Red Hat Linux 7.1", product: { name: "Red Hat Linux 7.1", product_id: "Red Hat Linux 7.1", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.1", }, }, }, { category: "product_name", name: "Red Hat Linux 7.2", product: { name: "Red Hat Linux 7.2", product_id: "Red Hat Linux 7.2", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.2", }, }, }, { category: "product_name", name: "Red Hat Linux 7.3", product: { name: "Red Hat Linux 7.3", product_id: "Red Hat Linux 7.3", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.3", }, }, }, { category: "product_name", name: "Red Hat Linux 8.0", product: { name: "Red Hat Linux 8.0", product_id: "Red Hat Linux 8.0", product_identification_helper: { cpe: "cpe:/o:redhat:linux:8.0", }, }, }, ], category: "product_family", name: "Red Hat Linux", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2002-1384", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616903", }, ], notes: [ { category: "description", text: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1384", }, { category: "external", summary: "RHBZ#1616903", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616903", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1384", url: "https://www.cve.org/CVERecord?id=CVE-2002-1384", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", }, ], release_date: "2002-12-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-02-06T15:03:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2003:037", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, ], }
RHSA-2002:295
Vulnerability from csaf_redhat
Published
2003-01-13 15:34
Modified
2025-01-16 18:55
Summary
Red Hat Security Advisory: : Updated CUPS packages fix various vulnerabilities
Notes
Topic
Updated CUPS packages are available for Red Hat Linux 7.3 and 8.0 which fix
various security issues.
Details
The Common UNIX Printing System (CUPS) provides a portable printing
layer. A number of vulnerabilities have been discovered in CUPS.
CUPS was distributed with Red Hat Linux 7.3 and 8.0 but is not
installed by default.
1. An integer overflow exists in the CUPS HTTP interface that allows
a local attacker to gain the permissions of the 'lp' user. (CAN-2002-1383)
2. A race condition exists in the creation of a pid file which allows
an attacker who already has privileges of the 'lp' user (for example from
utilizing a different exploit) to create or overwrite any file as
root, leading to arbitrary code execution. (CAN-2002-1366)
3. It is possible to remotely add a printer to CUPS by sending a
specially crafted UDP packet. If an attacker utilizes this vulnerability,
they could add a printer with a tainted name that if clicked on in the
web administration interface could be used to exploit other
vulnerabilities. (CAN-2002-1367)
By utilizing this vulnerability, an attacker could take a number of steps
to be able to get hold of the certificate used to access the administrative
section of the CUPS server and potentially add a printer that will execute
commands with root privileges.
4. Problems with chunked encoding and negative content length handling
in the CUPS HTTP interface can cause CUPS to crash. On Red Hat Linux
platforms this can cause a denial of service (DoS) against CUPS.
(CAN-2002-1368)
5. A number of integer overflows exist in the image handling code of
the filters in CUPS. In addition, CUPS does not properly check for
zero width GIF images. These vulnerabilities allow an attacker who has
the ability to print to run arbitrary code as the 'lp' user. (CAN-2002-1371)
6. An integer overflow exists in the CUPS pdftops filter. This can be
exploited by an attacker who is able to print sending a carefully
crafted PDF file which can execute arbitrary commands as the 'lp' user.
(CAN-2002-1384)
7. A buffer overflow exists in setting up the job management options.
When combined with other vulnerabilities, this could allow a local user
to gain root privileges. This issue only affects the version of CUPS
shipped with Red Hat Linux 7.3. (CAN-2002-1369)
8. A bug in the select() call would allow an easy DoS attack which would
cause CUPS to not recover once the DoS has stopped. (CAN-2002-1372)
Red Hat Linux 7.3 and 8.0 were shipped with versions of CUPS that are
vulnerable to these issues. All users of CUPS are advised to upgrade to the
erratum packages which contain a patch to correct these issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated CUPS packages are available for Red Hat Linux 7.3 and 8.0 which fix\nvarious security issues.", title: "Topic", }, { category: "general", text: "The Common UNIX Printing System (CUPS) provides a portable printing\nlayer. A number of vulnerabilities have been discovered in CUPS.\n\nCUPS was distributed with Red Hat Linux 7.3 and 8.0 but is not\ninstalled by default.\n\n1. An integer overflow exists in the CUPS HTTP interface that allows\na local attacker to gain the permissions of the 'lp' user. (CAN-2002-1383)\n\n2. A race condition exists in the creation of a pid file which allows\nan attacker who already has privileges of the 'lp' user (for example from\nutilizing a different exploit) to create or overwrite any file as\nroot, leading to arbitrary code execution. (CAN-2002-1366)\n\n3. It is possible to remotely add a printer to CUPS by sending a\nspecially crafted UDP packet. If an attacker utilizes this vulnerability,\nthey could add a printer with a tainted name that if clicked on in the\nweb administration interface could be used to exploit other\nvulnerabilities. (CAN-2002-1367)\n\nBy utilizing this vulnerability, an attacker could take a number of steps\nto be able to get hold of the certificate used to access the administrative\nsection of the CUPS server and potentially add a printer that will execute\ncommands with root privileges.\n\n4. Problems with chunked encoding and negative content length handling\nin the CUPS HTTP interface can cause CUPS to crash. On Red Hat Linux\nplatforms this can cause a denial of service (DoS) against CUPS. \n(CAN-2002-1368)\n\n5. A number of integer overflows exist in the image handling code of\nthe filters in CUPS. In addition, CUPS does not properly check for\nzero width GIF images. These vulnerabilities allow an attacker who has\nthe ability to print to run arbitrary code as the 'lp' user. (CAN-2002-1371)\n\n6. An integer overflow exists in the CUPS pdftops filter. This can be\nexploited by an attacker who is able to print sending a carefully\ncrafted PDF file which can execute arbitrary commands as the 'lp' user.\n(CAN-2002-1384)\n\n7. A buffer overflow exists in setting up the job management options.\nWhen combined with other vulnerabilities, this could allow a local user\nto gain root privileges. This issue only affects the version of CUPS\nshipped with Red Hat Linux 7.3. (CAN-2002-1369)\n\n8. A bug in the select() call would allow an easy DoS attack which would\ncause CUPS to not recover once the DoS has stopped. (CAN-2002-1372)\n\nRed Hat Linux 7.3 and 8.0 were shipped with versions of CUPS that are\nvulnerable to these issues. All users of CUPS are advised to upgrade to the\nerratum packages which contain a patch to correct these issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2002:295", url: "https://access.redhat.com/errata/RHSA-2002:295", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2002_295.json", }, ], title: "Red Hat Security Advisory: : Updated CUPS packages fix various vulnerabilities", tracking: { current_release_date: "2025-01-16T18:55:44+00:00", generator: { date: "2025-01-16T18:55:44+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.6", }, }, id: "RHSA-2002:295", initial_release_date: "2003-01-13T15:34:00+00:00", revision_history: [ { date: "2003-01-13T15:34:00+00:00", number: "1", summary: "Initial version", }, { date: "2003-02-07T00:00:00+00:00", number: "2", summary: "Last updated version", }, { date: "2025-01-16T18:55:44+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Linux 7.3", product: { name: "Red Hat Linux 7.3", product_id: "Red Hat Linux 7.3", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.3", }, }, }, { category: "product_name", name: "Red Hat Linux 8.0", product: { name: "Red Hat Linux 8.0", product_id: "Red Hat Linux 8.0", product_identification_helper: { cpe: "cpe:/o:redhat:linux:8.0", }, }, }, ], category: "product_family", name: "Red Hat Linux", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2002-1366", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616888", }, ], notes: [ { category: "description", text: "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows local users with lp privileges to create or overwrite arbitrary files via file race conditions, as demonstrated by ice-cream.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1366", }, { category: "external", summary: "RHBZ#1616888", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616888", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1366", url: "https://www.cve.org/CVERecord?id=CVE-2002-1366", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1366", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1366", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1367", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616889", }, ], notes: [ { category: "description", text: "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to add printers without authentication via a certain UDP packet, which can then be used to perform unauthorized activities such as stealing the local root certificate for the administration server via a \"need authorization\" page, as demonstrated by new-coke.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1367", }, { category: "external", summary: "RHBZ#1616889", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616889", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1367", url: "https://www.cve.org/CVERecord?id=CVE-2002-1367", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1367", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1367", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1368", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616890", }, ], notes: [ { category: "description", text: "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing negative arguments to be fed into memcpy() calls via HTTP requests with (1) a negative Content-Length value or (2) a negative length in a chunked transfer encoding.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1368", }, { category: "external", summary: "RHBZ#1616890", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616890", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1368", url: "https://www.cve.org/CVERecord?id=CVE-2002-1368", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1368", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1368", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1369", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616891", }, ], notes: [ { category: "description", text: "jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1369", }, { category: "external", summary: "RHBZ#1616891", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616891", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1369", url: "https://www.cve.org/CVERecord?id=CVE-2002-1369", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1369", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1369", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1371", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616892", }, ], notes: [ { category: "description", text: "filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1371", }, { category: "external", summary: "RHBZ#1616892", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616892", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1371", url: "https://www.cve.org/CVERecord?id=CVE-2002-1371", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1371", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1371", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1372", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616893", }, ], notes: [ { category: "description", text: "Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check the return values of various file and socket operations, which could allow a remote attacker to cause a denial of service (resource exhaustion) by causing file descriptors to be assigned and not released, as demonstrated by fanta.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1372", }, { category: "external", summary: "RHBZ#1616893", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616893", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1372", url: "https://www.cve.org/CVERecord?id=CVE-2002-1372", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1372", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1372", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, { cve: "CVE-2002-1383", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616902", }, ], notes: [ { category: "description", text: "Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1383", }, { category: "external", summary: "RHBZ#1616902", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616902", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1383", url: "https://www.cve.org/CVERecord?id=CVE-2002-1383", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1383", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1383", }, ], release_date: "2002-12-19T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], title: "security flaw", }, { cve: "CVE-2002-1384", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616903", }, ], notes: [ { category: "description", text: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1384", }, { category: "external", summary: "RHBZ#1616903", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616903", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1384", url: "https://www.cve.org/CVERecord?id=CVE-2002-1384", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", }, ], release_date: "2002-12-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-13T15:34:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:295", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, ], }
rhsa-2003_216
Vulnerability from csaf_redhat
Published
2003-06-30 22:36
Modified
2024-11-21 22:46
Summary
Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability
Notes
Topic
Updated Xpdf packages are available that fix a vulnerability where a
malicious PDF document could run arbitrary code.
Details
Xpdf is an X Window System based viewer for Portable Document Format (PDF)
files.
During an audit of CUPS, a printing system, Zen Parsec found an integer
overflow vulnerability in the pdftops filter. Since the code for pdftops is
taken from the Xpdf project, all versions of Xpdf including 2.01 are also
vulnerable to this issue. An attacker could create a PDF file that could
execute arbitrary code. This code would have the same access privileges as
the user who viewed the file with Xpdf.
Martyn Gilmore discovered a flaw in various PDF viewers and readers. An
attacker can embed malicious external-type hyperlinks that, if activated or
followed by a victim, can execute arbitrary shell commands. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0434 to this issue.
All users of Xpdf are advised to upgrade to these erratum packages, which
contain a patch correcting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated Xpdf packages are available that fix a vulnerability where a\nmalicious PDF document could run arbitrary code.", title: "Topic", }, { category: "general", text: "Xpdf is an X Window System based viewer for Portable Document Format (PDF)\nfiles.\n\nDuring an audit of CUPS, a printing system, Zen Parsec found an integer\noverflow vulnerability in the pdftops filter. Since the code for pdftops is\ntaken from the Xpdf project, all versions of Xpdf including 2.01 are also\nvulnerable to this issue. An attacker could create a PDF file that could\nexecute arbitrary code. This code would have the same access privileges as\nthe user who viewed the file with Xpdf.\n\nMartyn Gilmore discovered a flaw in various PDF viewers and readers. An\nattacker can embed malicious external-type hyperlinks that, if activated or\nfollowed by a victim, can execute arbitrary shell commands. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2003-0434 to this issue.\n\nAll users of Xpdf are advised to upgrade to these erratum packages, which\ncontain a patch correcting this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2003:216", url: "https://access.redhat.com/errata/RHSA-2003:216", }, { category: "external", summary: "http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html", url: "http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_216.json", }, ], title: "Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability", tracking: { current_release_date: "2024-11-21T22:46:41+00:00", generator: { date: "2024-11-21T22:46:41+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2003:216", initial_release_date: "2003-06-30T22:36:00+00:00", revision_history: [ { date: "2003-06-30T22:36:00+00:00", number: "1", summary: "Initial version", }, { date: "2003-06-30T00:00:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-21T22:46:41+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Linux 7.1", product: { name: "Red Hat Linux 7.1", product_id: "Red Hat Linux 7.1", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.1", }, }, }, ], category: "product_family", name: "Red Hat Linux", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2002-1384", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616903", }, ], notes: [ { category: "description", text: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.1", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1384", }, { category: "external", summary: "RHBZ#1616903", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616903", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1384", url: "https://www.cve.org/CVERecord?id=CVE-2002-1384", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", }, ], release_date: "2002-12-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-06-30T22:36:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.1", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2003:216", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, { cve: "CVE-2003-0434", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1617032", }, ], notes: [ { category: "description", text: "Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.1", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2003-0434", }, { category: "external", summary: "RHBZ#1617032", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1617032", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2003-0434", url: "https://www.cve.org/CVERecord?id=CVE-2003-0434", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2003-0434", url: "https://nvd.nist.gov/vuln/detail/CVE-2003-0434", }, ], release_date: "2003-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-06-30T22:36:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.1", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2003:216", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, ], }
RHSA-2002:307
Vulnerability from csaf_redhat
Published
2003-01-30 19:29
Modified
2024-11-21 22:34
Summary
Red Hat Security Advisory: xpdf security update
Notes
Topic
Updated Xpdf packages are available to fix a vulnerability where a
malicious PDF document could run arbitrary code.
[Updated 06 Feb 2003]
Added fixed packages for Advanced Workstation 2.1
Details
Xpdf is an X Window System based viewer for Portable Document Format
(PDF) files.
During an audit of CUPS, a printing system, Zen Parsec found an integer
overflow vulnerability in the pdftops filter. Since the code for pdftops
is taken from the Xpdf project, all versions of Xpdf including 2.01 are
also vulnerable to this issue. An attacker could create a malicious PDF
file that would execute arbitrary code as the user who used Xpdf to view it.
All users of Xpdf are advised to upgrade to these errata packages which
contain a patch to correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated Xpdf packages are available to fix a vulnerability where a\nmalicious PDF document could run arbitrary code.\n\n[Updated 06 Feb 2003]\nAdded fixed packages for Advanced Workstation 2.1", title: "Topic", }, { category: "general", text: "Xpdf is an X Window System based viewer for Portable Document Format\n(PDF) files.\n\nDuring an audit of CUPS, a printing system, Zen Parsec found an integer\noverflow vulnerability in the pdftops filter. Since the code for pdftops\nis taken from the Xpdf project, all versions of Xpdf including 2.01 are\nalso vulnerable to this issue. An attacker could create a malicious PDF\nfile that would execute arbitrary code as the user who used Xpdf to view it.\n\nAll users of Xpdf are advised to upgrade to these errata packages which\ncontain a patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2002:307", url: "https://access.redhat.com/errata/RHSA-2002:307", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2002_307.json", }, ], title: "Red Hat Security Advisory: xpdf security update", tracking: { current_release_date: "2024-11-21T22:34:25+00:00", generator: { date: "2024-11-21T22:34:25+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2002:307", initial_release_date: "2003-01-30T19:29:00+00:00", revision_history: [ { date: "2003-01-30T19:29:00+00:00", number: "1", summary: "Initial version", }, { date: "2003-02-07T00:00:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-21T22:34:25+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product: { name: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::as", }, }, }, { category: "product_name", name: "Red Hat Linux Advanced Workstation 2.1", product: { name: "Red Hat Linux Advanced Workstation 2.1", product_id: "Red Hat Linux Advanced Workstation 2.1", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::aw", }, }, }, ], category: "product_family", name: "Red Hat Advanced Products", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2002-1384", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616903", }, ], notes: [ { category: "description", text: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1384", }, { category: "external", summary: "RHBZ#1616903", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616903", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1384", url: "https://www.cve.org/CVERecord?id=CVE-2002-1384", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", }, ], release_date: "2002-12-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-30T19:29:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:307", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, ], }
RHSA-2003:037
Vulnerability from csaf_redhat
Published
2003-02-06 15:03
Modified
2024-11-21 22:34
Summary
Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability
Notes
Topic
Updated Xpdf packages are now available that fix a vulnerability in which a
maliciously-crafted pdf document could run arbitrary code.
[Updated 16 April 2003]
Added packages for Red Hat Linux on IBM iSeries and pSeries systems.
Details
Xpdf is a viewer for Portable Document Format (PDF) files.
During an audit of CUPS, a printing system, Zen Parsec found an integer
overflow vulnerability in the pdftops filter. Since the code for pdftops
is taken from the Xpdf project, all versions of Xpdf including 2.01 are
also vulnerable to this issue. An attacker could create a PDF
file that could execute arbitrary code. This could would have the same
access privileges as the user who viewed the file with Xpdf.
All users of Xpdf are advised to upgrade to these erratum packages. For
Red Hat Linux 8.0 we have included new packages based on Xpdf 1.01 with a
patch to correct this issue. For Red Hat Linux 7.0, 7.1, 7.2, and 7.3 we
have upgraded Xpdf to version 1.00 with a patch to correct this issue. For
Red Hat Linux 6.2 we have upgraded Xpdf to version 0.92 with a patch to
correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated Xpdf packages are now available that fix a vulnerability in which a\nmaliciously-crafted pdf document could run arbitrary code.\n\n[Updated 16 April 2003]\nAdded packages for Red Hat Linux on IBM iSeries and pSeries systems.", title: "Topic", }, { category: "general", text: "Xpdf is a viewer for Portable Document Format (PDF) files.\n\nDuring an audit of CUPS, a printing system, Zen Parsec found an integer\noverflow vulnerability in the pdftops filter. Since the code for pdftops\nis taken from the Xpdf project, all versions of Xpdf including 2.01 are\nalso vulnerable to this issue. An attacker could create a PDF\nfile that could execute arbitrary code. This could would have the same\naccess privileges as the user who viewed the file with Xpdf.\n\nAll users of Xpdf are advised to upgrade to these erratum packages. For\nRed Hat Linux 8.0 we have included new packages based on Xpdf 1.01 with a\npatch to correct this issue. For Red Hat Linux 7.0, 7.1, 7.2, and 7.3 we\nhave upgraded Xpdf to version 1.00 with a patch to correct this issue. For\nRed Hat Linux 6.2 we have upgraded Xpdf to version 0.92 with a patch to\ncorrect this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2003:037", url: "https://access.redhat.com/errata/RHSA-2003:037", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_037.json", }, ], title: "Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability", tracking: { current_release_date: "2024-11-21T22:34:29+00:00", generator: { date: "2024-11-21T22:34:29+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2003:037", initial_release_date: "2003-02-06T15:03:00+00:00", revision_history: [ { date: "2003-02-06T15:03:00+00:00", number: "1", summary: "Initial version", }, { date: "2003-02-06T00:00:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-21T22:34:29+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Linux 6.2", product: { name: "Red Hat Linux 6.2", product_id: "Red Hat Linux 6.2", product_identification_helper: { cpe: "cpe:/o:redhat:linux:6.2", }, }, }, { category: "product_name", name: "Red Hat Linux 7.0", product: { name: "Red Hat Linux 7.0", product_id: "Red Hat Linux 7.0", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.0", }, }, }, { category: "product_name", name: "Red Hat Linux 7.1", product: { name: "Red Hat Linux 7.1", product_id: "Red Hat Linux 7.1", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.1", }, }, }, { category: "product_name", name: "Red Hat Linux 7.2", product: { name: "Red Hat Linux 7.2", product_id: "Red Hat Linux 7.2", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.2", }, }, }, { category: "product_name", name: "Red Hat Linux 7.3", product: { name: "Red Hat Linux 7.3", product_id: "Red Hat Linux 7.3", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.3", }, }, }, { category: "product_name", name: "Red Hat Linux 8.0", product: { name: "Red Hat Linux 8.0", product_id: "Red Hat Linux 8.0", product_identification_helper: { cpe: "cpe:/o:redhat:linux:8.0", }, }, }, ], category: "product_family", name: "Red Hat Linux", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2002-1384", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616903", }, ], notes: [ { category: "description", text: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1384", }, { category: "external", summary: "RHBZ#1616903", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616903", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1384", url: "https://www.cve.org/CVERecord?id=CVE-2002-1384", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", }, ], release_date: "2002-12-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-02-06T15:03:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2003:037", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, ], }
rhsa-2003:216
Vulnerability from csaf_redhat
Published
2003-06-30 22:36
Modified
2024-11-21 22:46
Summary
Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability
Notes
Topic
Updated Xpdf packages are available that fix a vulnerability where a
malicious PDF document could run arbitrary code.
Details
Xpdf is an X Window System based viewer for Portable Document Format (PDF)
files.
During an audit of CUPS, a printing system, Zen Parsec found an integer
overflow vulnerability in the pdftops filter. Since the code for pdftops is
taken from the Xpdf project, all versions of Xpdf including 2.01 are also
vulnerable to this issue. An attacker could create a PDF file that could
execute arbitrary code. This code would have the same access privileges as
the user who viewed the file with Xpdf.
Martyn Gilmore discovered a flaw in various PDF viewers and readers. An
attacker can embed malicious external-type hyperlinks that, if activated or
followed by a victim, can execute arbitrary shell commands. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0434 to this issue.
All users of Xpdf are advised to upgrade to these erratum packages, which
contain a patch correcting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated Xpdf packages are available that fix a vulnerability where a\nmalicious PDF document could run arbitrary code.", title: "Topic", }, { category: "general", text: "Xpdf is an X Window System based viewer for Portable Document Format (PDF)\nfiles.\n\nDuring an audit of CUPS, a printing system, Zen Parsec found an integer\noverflow vulnerability in the pdftops filter. Since the code for pdftops is\ntaken from the Xpdf project, all versions of Xpdf including 2.01 are also\nvulnerable to this issue. An attacker could create a PDF file that could\nexecute arbitrary code. This code would have the same access privileges as\nthe user who viewed the file with Xpdf.\n\nMartyn Gilmore discovered a flaw in various PDF viewers and readers. An\nattacker can embed malicious external-type hyperlinks that, if activated or\nfollowed by a victim, can execute arbitrary shell commands. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2003-0434 to this issue.\n\nAll users of Xpdf are advised to upgrade to these erratum packages, which\ncontain a patch correcting this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2003:216", url: "https://access.redhat.com/errata/RHSA-2003:216", }, { category: "external", summary: "http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html", url: "http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_216.json", }, ], title: "Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability", tracking: { current_release_date: "2024-11-21T22:46:41+00:00", generator: { date: "2024-11-21T22:46:41+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2003:216", initial_release_date: "2003-06-30T22:36:00+00:00", revision_history: [ { date: "2003-06-30T22:36:00+00:00", number: "1", summary: "Initial version", }, { date: "2003-06-30T00:00:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-21T22:46:41+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Linux 7.1", product: { name: "Red Hat Linux 7.1", product_id: "Red Hat Linux 7.1", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.1", }, }, }, ], category: "product_family", name: "Red Hat Linux", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2002-1384", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616903", }, ], notes: [ { category: "description", text: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.1", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1384", }, { category: "external", summary: "RHBZ#1616903", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616903", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1384", url: "https://www.cve.org/CVERecord?id=CVE-2002-1384", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", }, ], release_date: "2002-12-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-06-30T22:36:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.1", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2003:216", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, { cve: "CVE-2003-0434", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1617032", }, ], notes: [ { category: "description", text: "Various PDF viewers including (1) Adobe Acrobat 5.06 and (2) Xpdf 1.01 allow remote attackers to execute arbitrary commands via shell metacharacters in an embedded hyperlink.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 7.1", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2003-0434", }, { category: "external", summary: "RHBZ#1617032", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1617032", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2003-0434", url: "https://www.cve.org/CVERecord?id=CVE-2003-0434", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2003-0434", url: "https://nvd.nist.gov/vuln/detail/CVE-2003-0434", }, ], release_date: "2003-06-13T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-06-30T22:36:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains\nthe desired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 7.1", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2003:216", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, ], }
rhsa-2003:037
Vulnerability from csaf_redhat
Published
2003-02-06 15:03
Modified
2024-11-21 22:34
Summary
Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability
Notes
Topic
Updated Xpdf packages are now available that fix a vulnerability in which a
maliciously-crafted pdf document could run arbitrary code.
[Updated 16 April 2003]
Added packages for Red Hat Linux on IBM iSeries and pSeries systems.
Details
Xpdf is a viewer for Portable Document Format (PDF) files.
During an audit of CUPS, a printing system, Zen Parsec found an integer
overflow vulnerability in the pdftops filter. Since the code for pdftops
is taken from the Xpdf project, all versions of Xpdf including 2.01 are
also vulnerable to this issue. An attacker could create a PDF
file that could execute arbitrary code. This could would have the same
access privileges as the user who viewed the file with Xpdf.
All users of Xpdf are advised to upgrade to these erratum packages. For
Red Hat Linux 8.0 we have included new packages based on Xpdf 1.01 with a
patch to correct this issue. For Red Hat Linux 7.0, 7.1, 7.2, and 7.3 we
have upgraded Xpdf to version 1.00 with a patch to correct this issue. For
Red Hat Linux 6.2 we have upgraded Xpdf to version 0.92 with a patch to
correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated Xpdf packages are now available that fix a vulnerability in which a\nmaliciously-crafted pdf document could run arbitrary code.\n\n[Updated 16 April 2003]\nAdded packages for Red Hat Linux on IBM iSeries and pSeries systems.", title: "Topic", }, { category: "general", text: "Xpdf is a viewer for Portable Document Format (PDF) files.\n\nDuring an audit of CUPS, a printing system, Zen Parsec found an integer\noverflow vulnerability in the pdftops filter. Since the code for pdftops\nis taken from the Xpdf project, all versions of Xpdf including 2.01 are\nalso vulnerable to this issue. An attacker could create a PDF\nfile that could execute arbitrary code. This could would have the same\naccess privileges as the user who viewed the file with Xpdf.\n\nAll users of Xpdf are advised to upgrade to these erratum packages. For\nRed Hat Linux 8.0 we have included new packages based on Xpdf 1.01 with a\npatch to correct this issue. For Red Hat Linux 7.0, 7.1, 7.2, and 7.3 we\nhave upgraded Xpdf to version 1.00 with a patch to correct this issue. For\nRed Hat Linux 6.2 we have upgraded Xpdf to version 0.92 with a patch to\ncorrect this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2003:037", url: "https://access.redhat.com/errata/RHSA-2003:037", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_037.json", }, ], title: "Red Hat Security Advisory: : : : Updated Xpdf packages fix security vulnerability", tracking: { current_release_date: "2024-11-21T22:34:29+00:00", generator: { date: "2024-11-21T22:34:29+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2003:037", initial_release_date: "2003-02-06T15:03:00+00:00", revision_history: [ { date: "2003-02-06T15:03:00+00:00", number: "1", summary: "Initial version", }, { date: "2003-02-06T00:00:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-21T22:34:29+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Linux 6.2", product: { name: "Red Hat Linux 6.2", product_id: "Red Hat Linux 6.2", product_identification_helper: { cpe: "cpe:/o:redhat:linux:6.2", }, }, }, { category: "product_name", name: "Red Hat Linux 7.0", product: { name: "Red Hat Linux 7.0", product_id: "Red Hat Linux 7.0", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.0", }, }, }, { category: "product_name", name: "Red Hat Linux 7.1", product: { name: "Red Hat Linux 7.1", product_id: "Red Hat Linux 7.1", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.1", }, }, }, { category: "product_name", name: "Red Hat Linux 7.2", product: { name: "Red Hat Linux 7.2", product_id: "Red Hat Linux 7.2", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.2", }, }, }, { category: "product_name", name: "Red Hat Linux 7.3", product: { name: "Red Hat Linux 7.3", product_id: "Red Hat Linux 7.3", product_identification_helper: { cpe: "cpe:/o:redhat:linux:7.3", }, }, }, { category: "product_name", name: "Red Hat Linux 8.0", product: { name: "Red Hat Linux 8.0", product_id: "Red Hat Linux 8.0", product_identification_helper: { cpe: "cpe:/o:redhat:linux:8.0", }, }, }, ], category: "product_family", name: "Red Hat Linux", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2002-1384", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616903", }, ], notes: [ { category: "description", text: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1384", }, { category: "external", summary: "RHBZ#1616903", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616903", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1384", url: "https://www.cve.org/CVERecord?id=CVE-2002-1384", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", }, ], release_date: "2002-12-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-02-06T15:03:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Linux 6.2", "Red Hat Linux 7.0", "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2003:037", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, ], }
rhsa-2002_307
Vulnerability from csaf_redhat
Published
2003-01-30 19:29
Modified
2024-11-21 22:34
Summary
Red Hat Security Advisory: xpdf security update
Notes
Topic
Updated Xpdf packages are available to fix a vulnerability where a
malicious PDF document could run arbitrary code.
[Updated 06 Feb 2003]
Added fixed packages for Advanced Workstation 2.1
Details
Xpdf is an X Window System based viewer for Portable Document Format
(PDF) files.
During an audit of CUPS, a printing system, Zen Parsec found an integer
overflow vulnerability in the pdftops filter. Since the code for pdftops
is taken from the Xpdf project, all versions of Xpdf including 2.01 are
also vulnerable to this issue. An attacker could create a malicious PDF
file that would execute arbitrary code as the user who used Xpdf to view it.
All users of Xpdf are advised to upgrade to these errata packages which
contain a patch to correct this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ document: { aggregate_severity: { namespace: "https://access.redhat.com/security/updates/classification/", text: "Important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright © Red Hat, Inc. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Updated Xpdf packages are available to fix a vulnerability where a\nmalicious PDF document could run arbitrary code.\n\n[Updated 06 Feb 2003]\nAdded fixed packages for Advanced Workstation 2.1", title: "Topic", }, { category: "general", text: "Xpdf is an X Window System based viewer for Portable Document Format\n(PDF) files.\n\nDuring an audit of CUPS, a printing system, Zen Parsec found an integer\noverflow vulnerability in the pdftops filter. Since the code for pdftops\nis taken from the Xpdf project, all versions of Xpdf including 2.01 are\nalso vulnerable to this issue. An attacker could create a malicious PDF\nfile that would execute arbitrary code as the user who used Xpdf to view it.\n\nAll users of Xpdf are advised to upgrade to these errata packages which\ncontain a patch to correct this issue.", title: "Details", }, { category: "legal_disclaimer", text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", title: "Terms of Use", }, ], publisher: { category: "vendor", contact_details: "https://access.redhat.com/security/team/contact/", issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", name: "Red Hat Product Security", namespace: "https://www.redhat.com", }, references: [ { category: "self", summary: "https://access.redhat.com/errata/RHSA-2002:307", url: "https://access.redhat.com/errata/RHSA-2002:307", }, { category: "external", summary: "https://access.redhat.com/security/updates/classification/#important", url: "https://access.redhat.com/security/updates/classification/#important", }, { category: "self", summary: "Canonical URL", url: "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2002_307.json", }, ], title: "Red Hat Security Advisory: xpdf security update", tracking: { current_release_date: "2024-11-21T22:34:25+00:00", generator: { date: "2024-11-21T22:34:25+00:00", engine: { name: "Red Hat SDEngine", version: "4.2.1", }, }, id: "RHSA-2002:307", initial_release_date: "2003-01-30T19:29:00+00:00", revision_history: [ { date: "2003-01-30T19:29:00+00:00", number: "1", summary: "Initial version", }, { date: "2003-02-07T00:00:00+00:00", number: "2", summary: "Last updated version", }, { date: "2024-11-21T22:34:25+00:00", number: "3", summary: "Last generated version", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product: { name: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_id: "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::as", }, }, }, { category: "product_name", name: "Red Hat Linux Advanced Workstation 2.1", product: { name: "Red Hat Linux Advanced Workstation 2.1", product_id: "Red Hat Linux Advanced Workstation 2.1", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:2.1::aw", }, }, }, ], category: "product_family", name: "Red Hat Advanced Products", }, ], category: "vendor", name: "Red Hat", }, ], }, vulnerabilities: [ { cve: "CVE-2002-1384", ids: [ { system_name: "Red Hat Bugzilla ID", text: "1616903", }, ], notes: [ { category: "description", text: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", title: "Vulnerability description", }, { category: "summary", text: "security flaw", title: "Vulnerability summary", }, ], product_status: { fixed: [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1", ], }, references: [ { category: "self", summary: "Canonical URL", url: "https://access.redhat.com/security/cve/CVE-2002-1384", }, { category: "external", summary: "RHBZ#1616903", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1616903", }, { category: "external", summary: "https://www.cve.org/CVERecord?id=CVE-2002-1384", url: "https://www.cve.org/CVERecord?id=CVE-2002-1384", }, { category: "external", summary: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", url: "https://nvd.nist.gov/vuln/detail/CVE-2002-1384", }, ], release_date: "2002-12-23T00:00:00+00:00", remediations: [ { category: "vendor_fix", date: "2003-01-30T19:29:00+00:00", details: "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", product_ids: [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1", ], restart_required: { category: "none", }, url: "https://access.redhat.com/errata/RHSA-2002:307", }, ], threats: [ { category: "impact", details: "Important", }, ], title: "security flaw", }, ], }
fkie_cve-2002-1384
Vulnerability from fkie_nvd
Published
2003-01-02 05:00
Modified
2024-11-20 23:41
Severity ?
Summary
Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
easy_software_products | cups | 1.0.4 | |
easy_software_products | cups | 1.0.4_8 | |
easy_software_products | cups | 1.1.1 | |
easy_software_products | cups | 1.1.4 | |
easy_software_products | cups | 1.1.4_2 | |
easy_software_products | cups | 1.1.4_3 | |
easy_software_products | cups | 1.1.4_5 | |
easy_software_products | cups | 1.1.6 | |
easy_software_products | cups | 1.1.7 | |
easy_software_products | cups | 1.1.10 | |
easy_software_products | cups | 1.1.13 | |
easy_software_products | cups | 1.1.14 | |
easy_software_products | cups | 1.1.17 | |
xpdf | xpdf | 0.90 | |
xpdf | xpdf | 0.91 | |
xpdf | xpdf | 1.0 | |
xpdf | xpdf | 1.0a | |
xpdf | xpdf | 1.1 | |
xpdf | xpdf | 2.0 | |
xpdf | xpdf | 2.1 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", matchCriteriaId: "68BD578F-CCAD-4515-9205-EB4F297C6DB4", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", matchCriteriaId: "F3182CA2-7375-43BC-A0E5-DE11D4B65EE3", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", matchCriteriaId: "FCF4C8D0-3030-4DD5-800B-76A582A4CD0C", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", matchCriteriaId: "734D0C2C-F71F-461A-87EE-202C6B706753", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", matchCriteriaId: "3F0F402D-5CD0-4477-8B59-C753CECB02BD", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", matchCriteriaId: "959F7AFA-ED20-434C-993F-06C2A8574662", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", matchCriteriaId: "D4F5A0A4-2884-46CA-A846-8B954EB80CFA", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", matchCriteriaId: "1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", matchCriteriaId: "35E65857-12C7-49DE-AD27-3CACD456231C", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", matchCriteriaId: "47CEF035-57A6-470B-916A-E5562C28E866", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", matchCriteriaId: "D414984E-4F6B-4278-8346-968587E4B18E", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", matchCriteriaId: "33C36DCB-2FDD-44E6-85E8-875575AAE69E", vulnerable: true, }, { criteria: "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", matchCriteriaId: "A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", matchCriteriaId: "28CC6233-E207-40CC-81FF-A8670EEA4295", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", matchCriteriaId: "64DD9B5C-3DB8-4E15-B4A6-541E4E221C1D", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", matchCriteriaId: "B95DA7DE-B786-4EE7-A3F4-C077A7986D5F", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", matchCriteriaId: "C5306C05-4A71-4175-8C22-F2DE0F2FE4C4", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", matchCriteriaId: "3B9DEF16-ECD5-4BBE-8986-52A6171B3D9F", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", matchCriteriaId: "CFFDBEEC-B2C1-47F0-82D3-FC9147B590A9", vulnerable: true, }, { criteria: "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", matchCriteriaId: "354487CF-0086-4AE2-872B-0032E3EB89EE", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", }, { lang: "es", value: "Desbordamiento de enteros en pdftops, usado en Xpdf 2.01 y anteriores, y CUPS antes de 1.1.18, permite a usuarios locales ejecutar código arbitrario mediante una entrada ColorSpace con un número de elementos largo, como ha sido demostrado por cups-pdf.", }, ], id: "CVE-2002-1384", lastModified: "2024-11-20T23:41:10.867", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], }, published: "2003-01-02T05:00:00.000", references: [ { source: "cve@mitre.org", url: "http://marc.info/?l=bugtraq&m=104152282309980&w=2", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2003/dsa-222", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2003/dsa-226", }, { source: "cve@mitre.org", url: "http://www.debian.org/security/2003/dsa-232", }, { source: "cve@mitre.org", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "http://www.idefense.com/advisory/12.23.02.txt", }, { source: "cve@mitre.org", url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001", }, { source: "cve@mitre.org", url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:002", }, { source: "cve@mitre.org", url: "http://www.novell.com/linux/security/advisories/2003_002_cups.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2002-295.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2002-307.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2003-037.html", }, { source: "cve@mitre.org", url: "http://www.redhat.com/support/errata/RHSA-2003-216.html", }, { source: "cve@mitre.org", url: "http://www.securityfocus.com/bid/6475", }, { source: "cve@mitre.org", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10937", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://marc.info/?l=bugtraq&m=104152282309980&w=2", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2003/dsa-222", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2003/dsa-226", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2003/dsa-232", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "http://www.idefense.com/advisory/12.23.02.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.novell.com/linux/security/advisories/2003_002_cups.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2002-295.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2002-307.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2003-037.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.redhat.com/support/errata/RHSA-2003-216.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securityfocus.com/bid/6475", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10937", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
gsd-2002-1384
Vulnerability from gsd
Modified
2023-12-13 01:24
Details
Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.
Aliases
Aliases
{ GSD: { alias: "CVE-2002-1384", description: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", id: "GSD-2002-1384", references: [ "https://www.debian.org/security/2003/dsa-232", "https://www.debian.org/security/2003/dsa-226", "https://www.debian.org/security/2003/dsa-222", "https://access.redhat.com/errata/RHSA-2003:216", "https://access.redhat.com/errata/RHSA-2003:037", "https://access.redhat.com/errata/RHSA-2002:307", "https://access.redhat.com/errata/RHSA-2002:295", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2002-1384", ], details: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", id: "GSD-2002-1384", modified: "2023-12-13T01:24:10.048064Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2002-1384", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "DSA-232", refsource: "DEBIAN", url: "http://www.debian.org/security/2003/dsa-232", }, { name: "RHSA-2002:295", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2002-295.html", }, { name: "MDKSA-2003:002", refsource: "MANDRAKE", url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:002", }, { name: "SUSE-SA:2003:002", refsource: "SUSE", url: "http://www.novell.com/linux/security/advisories/2003_002_cups.html", }, { name: "6475", refsource: "BID", url: "http://www.securityfocus.com/bid/6475", }, { name: "MDKSA-2003:001", refsource: "MANDRAKE", url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001", }, { name: "GLSA-200301-1", refsource: "GENTOO", url: "http://marc.info/?l=bugtraq&m=104152282309980&w=2", }, { name: "http://www.idefense.com/advisory/12.23.02.txt", refsource: "MISC", url: "http://www.idefense.com/advisory/12.23.02.txt", }, { name: "RHSA-2002:307", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2002-307.html", }, { name: "pdftops-integer-overflow(10937)", refsource: "XF", url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10937", }, { name: "RHSA-2003:216", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2003-216.html", }, { name: "DSA-226", refsource: "DEBIAN", url: "http://www.debian.org/security/2003/dsa-226", }, { name: "RHSA-2003:037", refsource: "REDHAT", url: "http://www.redhat.com/support/errata/RHSA-2003-037.html", }, { name: "DSA-222", refsource: "DEBIAN", url: "http://www.debian.org/security/2003/dsa-222", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:xpdf:xpdf:1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:xpdf:xpdf:2.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:xpdf:xpdf:2.1:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:xpdf:xpdf:0.90:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:xpdf:xpdf:0.91:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:xpdf:xpdf:1.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2002-1384", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], }, ], }, references: { reference_data: [ { name: "http://www.idefense.com/advisory/12.23.02.txt", refsource: "MISC", tags: [ "Exploit", "Patch", "Vendor Advisory", ], url: "http://www.idefense.com/advisory/12.23.02.txt", }, { name: "DSA-222", refsource: "DEBIAN", tags: [], url: "http://www.debian.org/security/2003/dsa-222", }, { name: "DSA-226", refsource: "DEBIAN", tags: [], url: "http://www.debian.org/security/2003/dsa-226", }, { name: "DSA-232", refsource: "DEBIAN", tags: [], url: "http://www.debian.org/security/2003/dsa-232", }, { name: "MDKSA-2003:001", refsource: "MANDRAKE", tags: [], url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001", }, { name: "MDKSA-2003:002", refsource: "MANDRAKE", tags: [], url: "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:002", }, { name: "RHSA-2002:295", refsource: "REDHAT", tags: [], url: "http://www.redhat.com/support/errata/RHSA-2002-295.html", }, { name: "RHSA-2002:307", refsource: "REDHAT", tags: [], url: "http://www.redhat.com/support/errata/RHSA-2002-307.html", }, { name: "RHSA-2003:037", refsource: "REDHAT", tags: [], url: "http://www.redhat.com/support/errata/RHSA-2003-037.html", }, { name: "RHSA-2003:216", refsource: "REDHAT", tags: [], url: "http://www.redhat.com/support/errata/RHSA-2003-216.html", }, { name: "SUSE-SA:2003:002", refsource: "SUSE", tags: [], url: "http://www.novell.com/linux/security/advisories/2003_002_cups.html", }, { name: "6475", refsource: "BID", tags: [], url: "http://www.securityfocus.com/bid/6475", }, { name: "GLSA-200301-1", refsource: "GENTOO", tags: [], url: "http://marc.info/?l=bugtraq&m=104152282309980&w=2", }, { name: "pdftops-integer-overflow(10937)", refsource: "XF", tags: [], url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/10937", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: true, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, }, lastModifiedDate: "2018-05-03T01:29Z", publishedDate: "2003-01-02T05:00Z", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.