Action not permitted
Modal body text goes here.
cve-2008-0047
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:32:24.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29485" }, { "name": "SUSE-SA:2008:015", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00005.html" }, { "name": "29573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29573" }, { "name": "ADV-2008-0921", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0921/references" }, { "name": "TA08-079A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "name": "1019646", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019646" }, { "name": "ADV-2008-0924", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "FEDORA-2008-2131", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00091.html" }, { "name": "USN-598-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "name": "MDVSA-2008:081", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "name": "29420", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29420" }, { "name": "APPLE-SA-2008-03-18", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "28307", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28307" }, { "name": "oval:org.mitre.oval:def:10085", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10085" }, { "name": "29750", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29750" }, { "name": "29448", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29448" }, { "name": "FEDORA-2008-2897", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" }, { "name": "29634", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29634" }, { "name": "29655", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29655" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "name": "29431", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29431" }, { "name": "20080318 Multiple Vendor CUPS CGI Heap Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674" }, { "name": "DSA-1530", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1530" }, { "name": "RHSA-2008:0192", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "name": "GLSA-200804-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "name": "29603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29603" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29485", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29485" }, { "name": "SUSE-SA:2008:015", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00005.html" }, { "name": "29573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29573" }, { "name": "ADV-2008-0921", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0921/references" }, { "name": "TA08-079A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "name": "1019646", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019646" }, { "name": "ADV-2008-0924", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "FEDORA-2008-2131", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00091.html" }, { "name": "USN-598-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "name": "MDVSA-2008:081", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "name": "29420", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29420" }, { "name": "APPLE-SA-2008-03-18", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "28307", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28307" }, { "name": "oval:org.mitre.oval:def:10085", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10085" }, { "name": "29750", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29750" }, { "name": "29448", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29448" }, { "name": "FEDORA-2008-2897", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" }, { "name": "29634", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29634" }, { "name": "29655", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29655" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "name": "29431", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29431" }, { "name": "20080318 Multiple Vendor CUPS CGI Heap Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674" }, { "name": "DSA-1530", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1530" }, { "name": "RHSA-2008:0192", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "name": "GLSA-200804-01", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "name": "29603", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29603" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29485", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29485" }, { "name": "SUSE-SA:2008:015", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00005.html" }, { "name": "29573", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29573" }, { "name": "ADV-2008-0921", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0921/references" }, { "name": "TA08-079A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "name": "1019646", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019646" }, { "name": "ADV-2008-0924", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "FEDORA-2008-2131", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00091.html" }, { "name": "USN-598-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "name": "MDVSA-2008:081", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "name": "29420", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29420" }, { "name": "APPLE-SA-2008-03-18", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "28307", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28307" }, { "name": "oval:org.mitre.oval:def:10085", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10085" }, { "name": "29750", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29750" }, { "name": "29448", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29448" }, { "name": "FEDORA-2008-2897", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" }, { "name": "29634", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29634" }, { "name": "29655", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29655" }, { "name": "http://docs.info.apple.com/article.html?artnum=307562", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "name": "29431", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29431" }, { "name": "20080318 Multiple Vendor CUPS CGI Heap Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674" }, { "name": "DSA-1530", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1530" }, { "name": "RHSA-2008:0192", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "name": "GLSA-200804-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "name": "29603", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29603" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0047", "datePublished": "2008-03-18T23:00:00", "dateReserved": "2008-01-03T00:00:00", "dateUpdated": "2024-08-07T07:32:24.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-0047\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-03-18T23:44:00.000\",\"lastModified\":\"2017-09-29T01:30:05.377\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en la funci\u00f3n cgiCompileSearch en CUPS versi\u00f3n 1.3.5 y otras versiones incluyendo la versi\u00f3n incorporada con Apple Mac OS X versi\u00f3n 10.5.2, cuando el uso compartido de impresoras est\u00e1 habilitado, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario por medio de expresiones de b\u00fasqueda dise\u00f1adas.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":9.3},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3267A41-1AE0-48B8-BD1F-DEC8A212851A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C73BED9E-29FB-4965-B38F-013FFE5A9170\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cups:cups:1.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EB2B6EB-FA2F-46FA-8086-F025722693A4\"}]}]}],\"references\":[{\"url\":\"http://docs.info.apple.com/article.html?artnum=307562\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00005.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/29420\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29431\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29448\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29485\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29573\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29603\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29634\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29655\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/29750\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200804-01.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1530\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2008:081\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0192.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/28307\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1019646\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-598-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA08-079A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0921/references\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/0924/references\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10085\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00091.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html\",\"source\":\"cve@mitre.org\"}]}}" } }
var-200803-0013
Vulnerability from variot
Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions. CUPS is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Failed exploit attempts will result in a denial of service. CUPS 1.3.5 is reported vulnerable; other versions may be affected as well. Apple Mac OS X is prone to multiple security vulnerabilities. These issues affect Mac OS X and various applications, including AFP Client, AFP Server, AppKit, Application Firewall, CoreFoundation, CoreServices, CUPS, Foundation, Help Viewer, Image Raw, libc, mDNSResponder, notifyd, pax archive utility, Podcast Producer, Preview, Printing, System Configuration, UDF, and Wiki Server. Attackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers. These issues affect Apple Mac OS X 10.4.11, 10.4.11 Server, 10.5.2, 10.5.2 Server and earlier. NOTE: This BID is being retired. The following individual records have been created to fully document all the vulnerabilities that were described in this BID: 28320 Apple Mac OS X AFP Client 'afp://' URI Remote Code Execution Vulnerability CVE-2008-0044. 28323 Apple Mac OS X AFP Server Cross-Realm Authentication Bypass Vulnerability CVE-2008-0994 28388 Apple Mac OS X AppKit NSDocument API's Stack Based Buffer Overflow Vulnerability CVE-2008-0048 28340 Apple Mac OS X AppKit Bootstrap Namespace Local Privilege Escalation Vulnerability CVE-2008-0049 28358 Apple Mac OS X AppKit Legacy Serialization Kit Multiple Integer Overflow Vulnerabilities CVE-2008-0057 28364 Apple Mac OS X AppKit PPD File Stack Buffer Overflow Vulnerability CVE-2008-0997 28368 Apple Mac OS X Application Firewall German Translation Insecure Configuration Weakness CVE-2008-0046 28375 Apple Mac OS X CoreFoundation Time Zone Data Local Privilege Escalation Vulnerability CVE-2008-0051 28384 Apple Mac OS X CoreServices '.ief' Files Security Policy Violation Weakness CVE-2008-0052 28334 CUPS Multiple Unspecified Input Validation Vulnerabilities 28341 Apple Mac OS X Foundation 'NSSelectorFromString' Input Validation Vulnerability 28343 Apple Mac OS X Foundation NSFileManager Insecure Directory Local Privilege Escalation Vulnerability 28357 Apple Mac OS X Foundation 'NSFileManager' Stack-Based Buffer Overflow Vulnerability 28359 Apple Mac OS X Foundation 'NSURLConnection' Cache Management Race Condition Security Vulnerability 28363 Apple Mac OS X Image RAW Stack-Based Buffer Overflow Vulnerability 28367 Apple Mac OS X Foundation 'NSXML' XML File Processing Race Condition Security Vulnerability 28371 Apple Mac OS X Help Viewer Remote Applescript Code Execution Vulnerability 28374 Apple Mac OS X libc 'strnstr(3)' Off-By-One Denial of Service Vulnerability 28387 Apple Mac OS X Printing To PDF Insecure Encryption Weakness 28386 Apple Mac OS X Preview PDF Insecure Encryption Weakness 28389 Apple Mac OS X Universal Disc Format Remote Denial of Service Vulnerability 28385 Apple Mac OS X NetCfgTool Local Privilege Escalation Vulnerability 28365 Apple Mac OS X pax Archive Utility Remote Code Execution Vulnerability 28344 Apple Mac OS X Authenticated Print Queue Information Disclosure Vulnerability 28345 Apple Mac OS X 'notifyd' Local Denial of Service Vulnerability 28372 Apple Mac OS X Podcast Producer Podcast Capture Information Disclosure Vulnerability 28339 Apple Mac OS X mDNSResponderHelper Local Format String Vulnerability. The system is based on the Internet Printing Protocol (IPP) and provides most PostScript and raster printer services. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-1530-1 security@debian.org http://www.debian.org/security/ Noah Meyerhans March 25, 2008 http://www.debian.org/security/faq
Package : cupsys Vulnerability : multiple Problem type : remote Debian-specific: no CVE Id(s) : CVE-2008-0047 CVE-2008-0882 Debian Bug : 472105 467653
Several local/remote vulnerabilities have been discovered in cupsys, the Common Unix Printing System.
For the stable distribution (etch), these problems have been fixed in version 1.2.7-4etch3
We recommend that you upgrade your cupsys packages.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Stable updates are available for alpha, amd64, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3.diff.gz Size/MD5 checksum: 104776 b684811e24921a7574798108ac6988d7 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3.dsc Size/MD5 checksum: 1084 0276f8e59e00181d39d204a28494d18c http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7.orig.tar.gz Size/MD5 checksum: 4214272 c9ba33356e5bb93efbcf77b6e142e498
Architecture independent packages:
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-common_1.2.7-4etch3_all.deb Size/MD5 checksum: 927322 65b1ff3cb7b8bbbe3b334ee43875aac4 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4etch3_all.deb Size/MD5 checksum: 45654 0b4ce3e9c2af460c5b694b906f450b12
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_alpha.deb Size/MD5 checksum: 1097006 45800a6b2c1dd7068843ade84480259d http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_alpha.deb Size/MD5 checksum: 39262 4f645e439999611b07348ad50e4da57d http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_alpha.deb Size/MD5 checksum: 174890 9affa7a1f2dc6548fcffb9a456181a3a http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_alpha.deb Size/MD5 checksum: 86292 23431d4bfae9599caba759d4b0a3a8c0 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_alpha.deb Size/MD5 checksum: 94814 6be946280a3c9fadfd070f7284255df0 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_alpha.deb Size/MD5 checksum: 1609104 ecdd9f65f8799605a1efeac0d4eae774 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_alpha.deb Size/MD5 checksum: 184372 7720c886672d63cdeb501314beacc4b5 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_alpha.deb Size/MD5 checksum: 72428 2b4ed65a0a33b7cf32756c2b0cd925de
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_amd64.deb Size/MD5 checksum: 52858 badd0d21043714aa2c612b45323890a1 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_amd64.deb Size/MD5 checksum: 1574654 cf1c04e898f7380fdd338ecafb69185e http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_amd64.deb Size/MD5 checksum: 85652 24c3d3e054306785ccc958f1894a2b18 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_amd64.deb Size/MD5 checksum: 142534 7ad95206e0e450f8df27c9d858809ddb http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_amd64.deb Size/MD5 checksum: 162008 44f8d076b07194023c8ef4348a56e97a http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_amd64.deb Size/MD5 checksum: 36352 5a4f9dc02fa0f8fb6936859c0fb1bd61 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_amd64.deb Size/MD5 checksum: 1086740 d466f2f5d8cb17ae0013dd99db5bcbb0 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_amd64.deb Size/MD5 checksum: 80704 d45a4a7461defd4c6b96bbfc292e3183
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_i386.deb Size/MD5 checksum: 1565044 7c19a56cb4a782487e104a01f31e0b47 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_i386.deb Size/MD5 checksum: 37600 fa90419b34b6733ef32f13797e4606f3 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_i386.deb Size/MD5 checksum: 79892 7460f7b76d597bcb02bdc0fe5897a32a http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_i386.deb Size/MD5 checksum: 86674 aebef9f4a309afdff01a7cce17b6f57b http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_i386.deb Size/MD5 checksum: 997608 e754dc8df237302fac7019754e42352b http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_i386.deb Size/MD5 checksum: 53418 b45cf2a324d52524244351d213c8be41 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_i386.deb Size/MD5 checksum: 137686 b726701fdb3e8948e5111e2e831bf853 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_i386.deb Size/MD5 checksum: 160080 c029e686ec624c2fdf156f885d1daf5c
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_ia64.deb Size/MD5 checksum: 1770478 73e7565983c31c3e651dd55acb38c0c7 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_ia64.deb Size/MD5 checksum: 203722 9d2b9b9d1c3999a3f4ccf7e5e446bd1a http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_ia64.deb Size/MD5 checksum: 1107480 d0898394febd60b7bf80e1e4ff335a39 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_ia64.deb Size/MD5 checksum: 73934 5156c8db255299aa66053bb4415cde19 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_ia64.deb Size/MD5 checksum: 106208 db2ad0519d15ee795758f72b3c093068 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_ia64.deb Size/MD5 checksum: 106220 8228fb0ccf8cc888973731f2aa72c8c4 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_ia64.deb Size/MD5 checksum: 192358 c1ee340a3e893b3f22adb138923167c2 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_ia64.deb Size/MD5 checksum: 46324 771aaa1b244d01eacdd62e8e963d434f
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_mips.deb Size/MD5 checksum: 86208 03d9d365f1c41e2efc36fc1a19dcb813 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_mips.deb Size/MD5 checksum: 1096636 65217c4fc57a23e065c9da14dfad6c9d http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_mips.deb Size/MD5 checksum: 1567240 46f2194418cb1d5800c44ae13bcd51ee http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_mips.deb Size/MD5 checksum: 57520 02e313bad869d4c50a6dde506765633b http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_mips.deb Size/MD5 checksum: 157528 f42c10ade950e4faa4403da4e8d740c4 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_mips.deb Size/MD5 checksum: 76156 d4778055a8900dcb6eaf2100a8172b63 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_mips.deb Size/MD5 checksum: 150976 5c00fd263eb81453450af5d5e79fe5b4 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_mips.deb Size/MD5 checksum: 36114 4ba209d715050a942d0c9025869378fe
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_mipsel.deb Size/MD5 checksum: 86404 41a26e5e4196385e67dddee0337c0ade http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_mipsel.deb Size/MD5 checksum: 158050 1b5af4a50dcfe41ec2b35af9a47d40b3 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_mipsel.deb Size/MD5 checksum: 36060 09d1cfdfb2e925b3f846d22cf760ba11 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_mipsel.deb Size/MD5 checksum: 1552652 67cf88cac0c510bec526c49025d7cbe0 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_mipsel.deb Size/MD5 checksum: 1084290 082931629866ea5a6aba940997698af7 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_mipsel.deb Size/MD5 checksum: 57694 6e120d7fc4a6643eb208333b30e7c5c9 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_mipsel.deb Size/MD5 checksum: 77448 f411d88639ee78a68d46ece45e91368f http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_mipsel.deb Size/MD5 checksum: 150900 09be1543e6cd767098a3af2a70791036
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_powerpc.deb Size/MD5 checksum: 136866 623ea75ab7f6603f9ddc9276389c90ea http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_powerpc.deb Size/MD5 checksum: 162686 5766c22ea9cad4f8e5acbf8dd6ad48f6 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_powerpc.deb Size/MD5 checksum: 87910 767921a7b2ed329a3107da1f0dbb7dda http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_powerpc.deb Size/MD5 checksum: 41298 875908633ca26db04739a334b03c42c2 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_powerpc.deb Size/MD5 checksum: 89998 0c81d4c99f07d7b0cdcd91a2a9a6ad28 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_powerpc.deb Size/MD5 checksum: 51788 87423f593d57c4c9d0cc80cfafa28f87 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_powerpc.deb Size/MD5 checksum: 1142146 6c4479057269b64596d123d5cf859747 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_powerpc.deb Size/MD5 checksum: 1575696 eb08aafdd1c60d707b874a31dcab67b4
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_s390.deb Size/MD5 checksum: 166184 d748308d0a477ad16a42e25671f49dd9 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_s390.deb Size/MD5 checksum: 37422 6a3f5390f4ff82bd1c8ef4d64f0fcc46 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_s390.deb Size/MD5 checksum: 1036106 08ad799adaeb1ccd9538048e685d69d6 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_s390.deb Size/MD5 checksum: 87194 e881e70f5b31b800989f14fd4e97368f http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_s390.deb Size/MD5 checksum: 52256 ec508d448806c889b0c79aed8d95cc3e http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_s390.deb Size/MD5 checksum: 82340 c9ab3bc26da68abdde50d365b4224434 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_s390.deb Size/MD5 checksum: 144934 61cf1f32851be64340ffb36b266ee0a7 http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_s390.deb Size/MD5 checksum: 1586624 1921d0bc3b7b03d4ed952ecb4b0b561b
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_sparc.deb Size/MD5 checksum: 78500 74d7872d04914d26d5a4baa768437603 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_sparc.deb Size/MD5 checksum: 51572 93fd782dbbc7148c9f96b18ad7ebe111 http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_sparc.deb Size/MD5 checksum: 84622 6eb7012156c87266af9802d38f1dd366 http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_sparc.deb Size/MD5 checksum: 158596 68ca94de2c329c162ae40ac5b79af29b http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_sparc.deb Size/MD5 checksum: 36018 61ffbfc960bea5c6fda52ffefa8886b7 http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_sparc.deb Size/MD5 checksum: 991000 3135666aadf8d4f4cd273fbd7d50cfca http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_sparc.deb Size/MD5 checksum: 139570 e281ec84c08bcac3f54d5017b6917e0b http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_sparc.deb Size/MD5 checksum: 1561792 21cd9a3e1e89ba96aa11890858194b82
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show
iD8DBQFH6RVAYrVLjBFATsMRAozSAJ9kTMEJ+adGZ1Sn0N6kOyhCmJU0HACeK7Xp 2NTRUT1F1Cu9Xrm9EGvmg3M= =Fgu/ -----END PGP SIGNATURE----- . =========================================================== Ubuntu Security Notice USN-598-1 April 02, 2008 cupsys vulnerabilities CVE-2008-0047, CVE-2008-0053, CVE-2008-0882, CVE-2008-1373 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 6.10 Ubuntu 7.04 Ubuntu 7.10
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: cupsys 1.2.2-0ubuntu0.6.06.8
Ubuntu 6.10: cupsys 1.2.4-2ubuntu3.3
Ubuntu 7.04: cupsys 1.2.8-0ubuntu8.3
Ubuntu 7.10: cupsys 1.3.2-1ubuntu7.6
In general, a standard system upgrade is sufficient to effect the necessary changes.
Details follow:
It was discovered that the CUPS administration interface contained a heap- based overflow flaw. A local attacker, and a remote attacker if printer sharing is enabled, could send a malicious request and possibly execute arbitrary code as the non-root user in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile. (CVE-2008-0047)
It was discovered that the hpgl filter in CUPS did not properly validate its input when parsing parameters. In Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile. (CVE-2008-0053)
It was discovered that CUPS had a flaw in its managing of remote shared printers via IPP. A remote attacker could send a crafted UDP packet and cause a denial of service or possibly execute arbitrary code as the non-root user in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile. (CVE-2008-0882)
It was discovered that CUPS did not properly perform bounds checking in its GIF decoding routines. If a crafted GIF file were printed, an attacker could possibly execute arbitrary code as the non-root user in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile. (CVE-2008-1373)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8.diff.gz
Size/MD5: 97650 b7ac4b760066920314d4596541cf716e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8.dsc
Size/MD5: 1049 26e617c4b5c0848d56f872895e279a86
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2.orig.tar.gz
Size/MD5: 4070384 2c99b8aa4c8dc25c8a84f9c06aa52e3e
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-gnutls10_1.2.2-0ubuntu0.6.06.8_all.deb
Size/MD5: 998 c7d4013c3b9e3655e2fd2e9719d4d2af
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.8_amd64.deb
Size/MD5: 36218 9eff8fd692afe5ae17ca80f269a0ca6b
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.8_amd64.deb
Size/MD5: 81906 ac05150f42e5671c5cdc73ba8f85cb5b
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8_amd64.deb
Size/MD5: 2286026 acd4a48c676556fc7260bbd86db0416b
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.8_amd64.deb
Size/MD5: 6096 3df7829bfb8766de94a4ef2ff0be824f
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.8_amd64.deb
Size/MD5: 76654 0d67c8599d4e2accf4f7ee31b498fdc7
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.8_amd64.deb
Size/MD5: 25758 14617ef9d38146ceaf89b4e9775e2fb4
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.8_amd64.deb
Size/MD5: 129498 5cd8c821b31dddde0c200a61570d48b6
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.8_i386.deb
Size/MD5: 34766 88ac5bced1d508f9695b4b4f4ae0f82a
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.8_i386.deb
Size/MD5: 77988 84db3f3ad17936d5015a26353c55bc6a
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8_i386.deb
Size/MD5: 2253492 2cc1ec94caf6344a555ece9f69b51fe2
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.8_i386.deb
Size/MD5: 6088 00226da0a854f64bd5b18ace219de031
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.8_i386.deb
Size/MD5: 75744 73038a225d7301b4b5f8085219c97c81
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.8_i386.deb
Size/MD5: 25740 52699a4b9dea621f4332db5856f8b574
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.8_i386.deb
Size/MD5: 121718 2e904399c40c9f83e451bb2e964820c1
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.8_powerpc.deb
Size/MD5: 40464 7e6bd3ec6312eef104737ffed5e19c3c
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.8_powerpc.deb
Size/MD5: 89542 8b9353d17d9402495f2404a9ab837b92
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8_powerpc.deb
Size/MD5: 2300680 65597d07917b8753a0af6f6aae1276db
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.8_powerpc.deb
Size/MD5: 6096 d6cb4780e6f4545bc8566cce92fb8346
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.8_powerpc.deb
Size/MD5: 78442 c75b4f47491227c2504649902a040855
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.8_powerpc.deb
Size/MD5: 25742 372a1c972e97e1722a844430780ae6c5
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.8_powerpc.deb
Size/MD5: 127478 afad79a272bbe434675f24d7a3ca91ef
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.8_sparc.deb
Size/MD5: 35396 b44ad7e913ff064d2a3fb73121771686
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.8_sparc.deb
Size/MD5: 78724 a8bff0942be4b14ece6dde8fd38b6f5a
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8_sparc.deb
Size/MD5: 2287122 2415f6a5410a63b98ba32ecdf8fbcfb7
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.8_sparc.deb
Size/MD5: 6094 384dc8a7b9c8dfbefa42d7b5fbb836c7
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.8_sparc.deb
Size/MD5: 75678 6258f4d4c1b55d90b34cee1caa12dc35
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.8_sparc.deb
Size/MD5: 25740 ca7f1a4412f42d739d51c1ddbc09045a
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.8_sparc.deb
Size/MD5: 123214 801292f8a2652b579a82b7a7c52e9ffd
Updated packages for Ubuntu 6.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3.diff.gz
Size/MD5: 111410 fb84af4bcf007f2f7299394e0be32412
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3.dsc
Size/MD5: 1059 430be555857b7aa5cc01431466487aaf
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4.orig.tar.gz
Size/MD5: 4091480 46722ad2dc78b12b5c05db2d080fe784
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.2.4-2ubuntu3.3_all.deb
Size/MD5: 870052 97e82b21269a8bb5e7ac995cc4cb665d
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.4-2ubuntu3.3_amd64.deb
Size/MD5: 36706 eb308fea40f4b7d159304b4b875b2329
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.4-2ubuntu3.3_amd64.deb
Size/MD5: 82506 3b04032674acc75d3184f537af144d3a
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3_amd64.deb
Size/MD5: 1480680 18b1537c8238b225e6ba2bb51570b942
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.4-2ubuntu3.3_amd64.deb
Size/MD5: 6122 b324305be458b5207d242efc230d06c1
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.4-2ubuntu3.3_amd64.deb
Size/MD5: 95522 fce843ba1e5c51ec7a8161f0a0828acc
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.4-2ubuntu3.3_amd64.deb
Size/MD5: 26138 041e52bad239d993b22d65873705a751
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.4-2ubuntu3.3_amd64.deb
Size/MD5: 172282 cf3fd3c84c83b36aa453ca2e071ab74c
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.4-2ubuntu3.3_i386.deb
Size/MD5: 36260 c2daeb19fee1ebfe794be09ebefef1c7
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.4-2ubuntu3.3_i386.deb
Size/MD5: 80108 c599f739a103867967a78f91569db74e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3_i386.deb
Size/MD5: 1463912 d22879a24e9f1ff1d12e7845ad596cc2
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.4-2ubuntu3.3_i386.deb
Size/MD5: 6124 01628551a9fc66423789f02853d0d9ba
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.4-2ubuntu3.3_i386.deb
Size/MD5: 95352 b6084c36087da3aa1a3c8d44f9a9d0a7
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.4-2ubuntu3.3_i386.deb
Size/MD5: 26142 838499ddbf886c5514ef11c6e4bdeda9
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.4-2ubuntu3.3_i386.deb
Size/MD5: 169404 8262471b1cdb9991fbde554a31c74508
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.4-2ubuntu3.3_powerpc.deb
Size/MD5: 41802 b703ca8629e5df46fc1f1d45acd20581
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.4-2ubuntu3.3_powerpc.deb
Size/MD5: 91148 caca2486db7794b133539af9b939a607
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3_powerpc.deb
Size/MD5: 1498496 0662d077dfae2d1b6b00db7a0966366b
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.4-2ubuntu3.3_powerpc.deb
Size/MD5: 6128 792c5ee645b0f7a7e1d63d9206348c52
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.4-2ubuntu3.3_powerpc.deb
Size/MD5: 97682 b37660eb88a487e5f7c49b9ed6f1c937
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.4-2ubuntu3.3_powerpc.deb
Size/MD5: 26144 b834556e6374093f5652754dd8c0ff6a
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.4-2ubuntu3.3_powerpc.deb
Size/MD5: 172694 3174ff36eaa0bc4ac7f4df02299413ca
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.4-2ubuntu3.3_sparc.deb
Size/MD5: 36292 2cd1ea5a42eff193ca8a4c2ec53aefa1
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.4-2ubuntu3.3_sparc.deb
Size/MD5: 80238 10b95fff38cb0436cf30a30e683cc27d
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3_sparc.deb
Size/MD5: 1489214 119f077088e3b2009c896fd395448717
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.4-2ubuntu3.3_sparc.deb
Size/MD5: 6128 204a14898a9508a980e71d33792cfb59
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.4-2ubuntu3.3_sparc.deb
Size/MD5: 94574 a87580c3fd22da592dd5496190afb871
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.4-2ubuntu3.3_sparc.deb
Size/MD5: 26142 e7b959209cad884220bb1cacb2cd0555
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.4-2ubuntu3.3_sparc.deb
Size/MD5: 168700 1f717ec06409999b5a40bb89dcedb5b0
Updated packages for Ubuntu 7.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3.diff.gz
Size/MD5: 156263 0147ec4c77b27e20df2a3ad514c2dd8e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3.dsc
Size/MD5: 1143 7fb2ad1b1c8e57b09805fc9d6c1e027d
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8.orig.tar.gz
Size/MD5: 4293194 107affe95fcf1cd4aaed4a5c73f4b91f
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.2.8-0ubuntu8.3_all.deb
Size/MD5: 926414 97df229c931f7eb05af5a5cb623635ae
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.8-0ubuntu8.3_amd64.deb
Size/MD5: 37412 20fb406aae21e63dc8c9723e178505af
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.8-0ubuntu8.3_amd64.deb
Size/MD5: 83238 9aa9eb876585e32757c83783d79b0a02
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3_amd64.deb
Size/MD5: 1638304 7673386b3a9d63c09bd3647cf5dad877
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.8-0ubuntu8.3_amd64.deb
Size/MD5: 56378 32e2acb4fe5ef7aab8b8896a8d40166c
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.8-0ubuntu8.3_amd64.deb
Size/MD5: 104324 649109ddb522145730c67b93a870eefe
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.8-0ubuntu8.3_amd64.deb
Size/MD5: 144860 c0fb60ebae640e565607f0cdfd7094b7
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.8-0ubuntu8.3_amd64.deb
Size/MD5: 182344 204887dda2791a61417415c4466a51d7
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.8-0ubuntu8.3_i386.deb
Size/MD5: 36722 22030307f71a44ca7b30921aef0bf46a
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.8-0ubuntu8.3_i386.deb
Size/MD5: 80738 c92706978d65b9a409d93e704c5662b4
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3_i386.deb
Size/MD5: 1620944 bc9a1e338567e27aee10cded16abbcc2
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.8-0ubuntu8.3_i386.deb
Size/MD5: 55472 15cd34697cca79ee83498691da531d37
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.8-0ubuntu8.3_i386.deb
Size/MD5: 104028 3d13c92bf5f0c9a26f3a8ba534dc6dec
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.8-0ubuntu8.3_i386.deb
Size/MD5: 139332 c33597e3bbce0d41df0efe84c2b59377
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.8-0ubuntu8.3_i386.deb
Size/MD5: 178604 a93713bb9b422a0460d42dc35eb7f8b3
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.8-0ubuntu8.3_powerpc.deb
Size/MD5: 46768 682b1e104c73d8820a5b39ba79de7883
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.8-0ubuntu8.3_powerpc.deb
Size/MD5: 101104 78dcf70528f5682b2499efa0b03f6a42
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3_powerpc.deb
Size/MD5: 1695542 06c8b6b43afa525b07718d410eed6438
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.8-0ubuntu8.3_powerpc.deb
Size/MD5: 56226 27ce8328e4cfc184ef64fdfe5bcf1b45
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.8-0ubuntu8.3_powerpc.deb
Size/MD5: 109886 607c9d1bdc4eaf3627031f98f59948be
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.8-0ubuntu8.3_powerpc.deb
Size/MD5: 141172 501aee8031dd71ce2166e79bfca04129
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.8-0ubuntu8.3_powerpc.deb
Size/MD5: 188236 ccbcdb277477728c10dac36435924085
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.8-0ubuntu8.3_sparc.deb
Size/MD5: 37788 7da1fb58e7d4b6bfd71ed47b1ba5d201
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.8-0ubuntu8.3_sparc.deb
Size/MD5: 83750 69a59033ea6458f3f82046aee46ba4bb
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3_sparc.deb
Size/MD5: 1658908 b35167112445c8bc3c1281604412f534
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.8-0ubuntu8.3_sparc.deb
Size/MD5: 54756 b877de97919e00870c84850b1e074555
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.8-0ubuntu8.3_sparc.deb
Size/MD5: 103574 204efb55b2d46f00cd4f8ddc429d805f
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.8-0ubuntu8.3_sparc.deb
Size/MD5: 141742 5e411c3199e1a1296dbd7cd7c6958e1a
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.8-0ubuntu8.3_sparc.deb
Size/MD5: 177884 4e1b218fd113193e4cf149aea90ec6c7
Updated packages for Ubuntu 7.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6.diff.gz
Size/MD5: 125298 81ae6b42c7dd12a1797a63d19c644a8c
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6.dsc
Size/MD5: 1218 c56faedc440fc2b16f9a1f396a607d1e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2.orig.tar.gz
Size/MD5: 4848424 9e3e1dee4d872fdff0682041198d3d73
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.3.2-1ubuntu7.6_all.deb
Size/MD5: 1080444 5d01f105292a526744e5622a14a9aed4
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.6_amd64.deb
Size/MD5: 37204 c3425972caa02e7a25321f49d47c6f9b
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.6_amd64.deb
Size/MD5: 89504 5411f2454e0d2a0323e9951cb15a534d
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6_amd64.deb
Size/MD5: 2034570 c8d6548bd1ba7cb841b196e762da492c
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.6_amd64.deb
Size/MD5: 59890 150d59889adc8fd0cb185989876a355d
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.6_amd64.deb
Size/MD5: 46780 e15952781e93e862194d453320605bbc
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.6_amd64.deb
Size/MD5: 152020 32c671873dfad4e39104da5c3a6e935e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.6_amd64.deb
Size/MD5: 186028 1a1404a7d67078e31c8819bf3d8d4dae
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.6_i386.deb
Size/MD5: 36476 a982fce3918a91c74e92fb515f1c6d65
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.6_i386.deb
Size/MD5: 86484 0e4d80917e070f7b2f109de81f96bc4d
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6_i386.deb
Size/MD5: 2018116 cff3abb1b69d797d616e73c93885de3a
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.6_i386.deb
Size/MD5: 58634 6d2590c49af04215519a87e857463652
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.6_i386.deb
Size/MD5: 46140 0ebe76bdf799336e0b2d01d0a0eca72c
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.6_i386.deb
Size/MD5: 145694 6766e6515de26b782e211840f330b93e
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.6_i386.deb
Size/MD5: 182802 c62bc1107e748c200e6969a239ae8b9b
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.6_powerpc.deb
Size/MD5: 46498 044a54c557dd4006bb40a13dd2c2b156
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.6_powerpc.deb
Size/MD5: 107752 76e4020feb1778e713389fc6bdb86ea9
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6_powerpc.deb
Size/MD5: 2099222 73d517a40d877a238856a232e6be64c9
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.6_powerpc.deb
Size/MD5: 59342 8530840cf85bf44c8803fd064b61e1f7
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.6_powerpc.deb
Size/MD5: 51716 9d30c790a4b94ac07670d7e15c2e41ab
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.6_powerpc.deb
Size/MD5: 146948 f73327e30e2778bdcf4543c04855e6a1
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.6_powerpc.deb
Size/MD5: 191752 46d534c4c477657ab03419d18f91728f
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.6_sparc.deb
Size/MD5: 37564 1771f3f6f2ceb1864696801f7f420e93
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.6_sparc.deb
Size/MD5: 89606 69149447dbd4e3b36185bd977202f837
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6_sparc.deb
Size/MD5: 2060610 ed932d7ee05e745bc0af647d361e7d99
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.6_sparc.deb
Size/MD5: 57900 7369866ac9adb6abd966e2d1e2f95b42
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.6_sparc.deb
Size/MD5: 45440 60eda5d4cc12eb2c35817d6c0d4ef43a
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.6_sparc.deb
Size/MD5: 148476 8e1d119a91b8c6d8d15032b27a498235
http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.6_sparc.deb
Size/MD5: 181842 8283739361474f00d65f9bf52d7c0e3d
.
Finally, a vulnerability in how CUPS handled GIF files was found by Tomas Hoger of Red Hat, similar to previous issues corrected in PHP, gd, tk, netpbm, and SDL_image (CVE-2008-1373).
The updated packages have been patched to correct these issues.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0047 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0053 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373
Updated Packages:
Mandriva Linux 2007.0: 4ecbfe664ba6820bf06dc406133e265c 2007.0/i586/cups-1.2.4-1.8mdv2007.0.i586.rpm 6d51733a95884e36cca9570738537ff6 2007.0/i586/cups-common-1.2.4-1.8mdv2007.0.i586.rpm abe0591d8b2b390a82dffcd2fed43b14 2007.0/i586/cups-serial-1.2.4-1.8mdv2007.0.i586.rpm 91ffe19d342810de71e056e213056552 2007.0/i586/libcups2-1.2.4-1.8mdv2007.0.i586.rpm 71fd9246da1e48b2dc6a60ceeae41e48 2007.0/i586/libcups2-devel-1.2.4-1.8mdv2007.0.i586.rpm bd0f3b69fe5dc7bddd6c121200db014d 2007.0/i586/php-cups-1.2.4-1.8mdv2007.0.i586.rpm cb50a10a1096424175c1a49e8e22a8a1 2007.0/SRPMS/cups-1.2.4-1.8mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64: d9423a942f4f779959cfe489866b52f5 2007.0/x86_64/cups-1.2.4-1.8mdv2007.0.x86_64.rpm 8b13ba591a7dc53c658876dae447ce17 2007.0/x86_64/cups-common-1.2.4-1.8mdv2007.0.x86_64.rpm 9e434edde16c05fded1b706adaae859d 2007.0/x86_64/cups-serial-1.2.4-1.8mdv2007.0.x86_64.rpm 9733f3116c8488148471af3d5bdafd16 2007.0/x86_64/lib64cups2-1.2.4-1.8mdv2007.0.x86_64.rpm fbb5010088c23aa2cf635875179adc3c 2007.0/x86_64/lib64cups2-devel-1.2.4-1.8mdv2007.0.x86_64.rpm 00e05d49f33ef5d0067287ef1a27246c 2007.0/x86_64/php-cups-1.2.4-1.8mdv2007.0.x86_64.rpm cb50a10a1096424175c1a49e8e22a8a1 2007.0/SRPMS/cups-1.2.4-1.8mdv2007.0.src.rpm
Mandriva Linux 2007.1: dc81f96bd48732eed770b0090b333695 2007.1/i586/cups-1.2.10-2.6mdv2007.1.i586.rpm 3545d312400a8f5aad55e323d2ff3543 2007.1/i586/cups-common-1.2.10-2.6mdv2007.1.i586.rpm f4656b26df51f63813a49006415a783b 2007.1/i586/cups-serial-1.2.10-2.6mdv2007.1.i586.rpm ab1869c8ddeda927fdfbc49c386756f1 2007.1/i586/libcups2-1.2.10-2.6mdv2007.1.i586.rpm 5de192ed26380212896fcd376a1b3e23 2007.1/i586/libcups2-devel-1.2.10-2.6mdv2007.1.i586.rpm a347c58fc3e76e064cabf8425d0245ab 2007.1/i586/php-cups-1.2.10-2.6mdv2007.1.i586.rpm 15c9274e61f9dbe98150fa1ae58ef7bc 2007.1/SRPMS/cups-1.2.10-2.6mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64: 1faa57f00d0577f6d25cddf7fccd7edb 2007.1/x86_64/cups-1.2.10-2.6mdv2007.1.x86_64.rpm 26a14fabfef38f2fd4ab88c6184d4e2f 2007.1/x86_64/cups-common-1.2.10-2.6mdv2007.1.x86_64.rpm b5a49bfbeb004af58e1e5f9c1660dece 2007.1/x86_64/cups-serial-1.2.10-2.6mdv2007.1.x86_64.rpm 6b81f4e888dec6e94231b01fd5d162bf 2007.1/x86_64/lib64cups2-1.2.10-2.6mdv2007.1.x86_64.rpm 256313a9ac10203a7d59deb6ff0a3da0 2007.1/x86_64/lib64cups2-devel-1.2.10-2.6mdv2007.1.x86_64.rpm 41e268b0e9e8a5e256c9af6192dfcae0 2007.1/x86_64/php-cups-1.2.10-2.6mdv2007.1.x86_64.rpm 15c9274e61f9dbe98150fa1ae58ef7bc 2007.1/SRPMS/cups-1.2.10-2.6mdv2007.1.src.rpm
Mandriva Linux 2008.0: 27ee99856a1c4448cdee618f2db8ae52 2008.0/i586/cups-1.3.6-1.1mdv2008.0.i586.rpm 09a6026a683b1ea029b63b0480aa2d4b 2008.0/i586/cups-common-1.3.6-1.1mdv2008.0.i586.rpm 7974c9c3a572a389fea83250cd57c8e1 2008.0/i586/cups-serial-1.3.6-1.1mdv2008.0.i586.rpm a6432e417d401b7900113763255bf8c3 2008.0/i586/libcups2-1.3.6-1.1mdv2008.0.i586.rpm cfb0fd68a1d60f1dfa985da0bb79190f 2008.0/i586/libcups2-devel-1.3.6-1.1mdv2008.0.i586.rpm aba1862f9db0e18f09d581ef0a95fde8 2008.0/i586/php-cups-1.3.6-1.1mdv2008.0.i586.rpm e034c775d5b04fffb14cb441b8174a55 2008.0/SRPMS/cups-1.3.6-1.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: b18f356dc9fc5cda784e576e3f20a801 2008.0/x86_64/cups-1.3.6-1.1mdv2008.0.x86_64.rpm bccc98b2ad3205d2c301036ba9d28f61 2008.0/x86_64/cups-common-1.3.6-1.1mdv2008.0.x86_64.rpm 1c1837c8a8eb04609daa405553ab7fe8 2008.0/x86_64/cups-serial-1.3.6-1.1mdv2008.0.x86_64.rpm 5748bf84c1239e2b4255446cbf6c8285 2008.0/x86_64/lib64cups2-1.3.6-1.1mdv2008.0.x86_64.rpm bd593d10e724d5fcb41a474ceb985996 2008.0/x86_64/lib64cups2-devel-1.3.6-1.1mdv2008.0.x86_64.rpm f2db5dfbb8dc8327965a45a5d88e0b6d 2008.0/x86_64/php-cups-1.3.6-1.1mdv2008.0.x86_64.rpm e034c775d5b04fffb14cb441b8174a55 2008.0/SRPMS/cups-1.3.6-1.1mdv2008.0.src.rpm
Corporate 3.0: 21bb1e12de3ad442d1abcf6b748e4612 corporate/3.0/i586/cups-1.1.20-5.17.C30mdk.i586.rpm 0b98a618d204f1cb5d93cfc8bc17ce04 corporate/3.0/i586/cups-common-1.1.20-5.17.C30mdk.i586.rpm b4d7d4823f4a052f1b88de95c15fdd35 corporate/3.0/i586/cups-serial-1.1.20-5.17.C30mdk.i586.rpm 15ff4fca1070bde09536ef5c152f93fa corporate/3.0/i586/libcups2-1.1.20-5.17.C30mdk.i586.rpm 29a49e9cd1dab4afc7d4b45f756db2ec corporate/3.0/i586/libcups2-devel-1.1.20-5.17.C30mdk.i586.rpm 2d3ba4ca7a10c5842f6eeb6a7f847e86 corporate/3.0/SRPMS/cups-1.1.20-5.17.C30mdk.src.rpm
Corporate 3.0/X86_64: f977134efb9f309911bfc1b4850e82f0 corporate/3.0/x86_64/cups-1.1.20-5.17.C30mdk.x86_64.rpm 36fff0b8424e4f651e6f055c70008521 corporate/3.0/x86_64/cups-common-1.1.20-5.17.C30mdk.x86_64.rpm 696c4e4cc405b9ca56f22819fa2f818b corporate/3.0/x86_64/cups-serial-1.1.20-5.17.C30mdk.x86_64.rpm 942d626665fe5a05f879411e7ca80030 corporate/3.0/x86_64/lib64cups2-1.1.20-5.17.C30mdk.x86_64.rpm e191a6945b87e3b33617a3de06561d3e corporate/3.0/x86_64/lib64cups2-devel-1.1.20-5.17.C30mdk.x86_64.rpm 2d3ba4ca7a10c5842f6eeb6a7f847e86 corporate/3.0/SRPMS/cups-1.1.20-5.17.C30mdk.src.rpm
Corporate 4.0: a091b07a3a414304cf24e76ab99d3afe corporate/4.0/i586/cups-1.2.4-0.8.20060mlcs4.i586.rpm 4cabdbd655b65028ee5bdfb3452f4506 corporate/4.0/i586/cups-common-1.2.4-0.8.20060mlcs4.i586.rpm 534437dd5a286f0484df0e2cdfd9e636 corporate/4.0/i586/cups-serial-1.2.4-0.8.20060mlcs4.i586.rpm 0dd449c47be977964034d699749738f7 corporate/4.0/i586/libcups2-1.2.4-0.8.20060mlcs4.i586.rpm 6aad89786cfec35bc5e81eb3a1dc8cd4 corporate/4.0/i586/libcups2-devel-1.2.4-0.8.20060mlcs4.i586.rpm fc46181aa746a4f637d66681fb975560 corporate/4.0/i586/php-cups-1.2.4-0.8.20060mlcs4.i586.rpm 83a55c89caf98419e9f76b58c6bee2e5 corporate/4.0/SRPMS/cups-1.2.4-0.8.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 7c7624e35383c614691e4063215f8d65 corporate/4.0/x86_64/cups-1.2.4-0.8.20060mlcs4.x86_64.rpm 17f29e8614a988900a09305adfd1c85b corporate/4.0/x86_64/cups-common-1.2.4-0.8.20060mlcs4.x86_64.rpm 773484820406d7285608081cb7e262d2 corporate/4.0/x86_64/cups-serial-1.2.4-0.8.20060mlcs4.x86_64.rpm a53e7a817a42ccc1ac5a5daa7602c4d8 corporate/4.0/x86_64/lib64cups2-1.2.4-0.8.20060mlcs4.x86_64.rpm ad933e76d237bbb83bf568071566ba37 corporate/4.0/x86_64/lib64cups2-devel-1.2.4-0.8.20060mlcs4.x86_64.rpm 4c6d20646db4de2ab03907c9b6705067 corporate/4.0/x86_64/php-cups-1.2.4-0.8.20060mlcs4.x86_64.rpm 83a55c89caf98419e9f76b58c6bee2e5 corporate/4.0/SRPMS/cups-1.2.4-0.8.20060mlcs4.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFH88NLmqjQ0CJFipgRAvgQAJ9PyMfRvtdcft3hCuqCnGg+4dLucQCgrz1i QDjzjtxa/ZH8ibtkLnEJNvQ= =7iZK -----END PGP SIGNATURE----- . iDefense Security Advisory 03.18.08 http://labs.idefense.com/intelligence/vulnerabilities/ Mar 18, 2008
I. BACKGROUND
The Common UNIX Printing System, more commonly referred to as CUPS, provides a standard printer interface for various Unix based operating systems. For more information, visit the vendor's website at the following URL.
http://www.cups.org/
II.
CUPS listens on TCP port 631 for requests. This interface provides access to several CGI applications used to administer CUPS and provide information about print jobs. By passing a specially crafted request, an attacker can trigger a heap based buffer overflow.
III. Depending on the underlying operating system and distribution, CUPS may run as the lp, daemon, or a different user.
In order to exploit this vulnerability remotely, the targeted host must be sharing a printer(s) on the network. If a printer is not being shared, where CUPS only listens on the local interface, this vulnerability could only be used to elevate privileges locally.
IV.
V. WORKAROUND
Disabling printer sharing will prevent this vulnerability from being exploited remotely. However, local users will still be able to obtain the privileges of the CUPS service user.
VI. VENDOR RESPONSE
Apple Inc. has addressed this vulnerability within Security Update 2008-002. For more information, visit the following URL.
http://docs.info.apple.com/article.html?artnum=307562
VII. CVE INFORMATION
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2008-0047 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems.
VIII. DISCLOSURE TIMELINE
02/26/2008 Initial vendor notification 02/26/2008 Initial vendor response 03/18/2008 Coordinated public disclosure
IX. CREDIT
This vulnerability was reported to iDefense by regenrecht.
Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php
Free tools, research and upcoming events http://labs.idefense.com/
X. LEGAL NOTICES
Copyright \xa9 2008 iDefense, Inc.
Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission.
Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200804-01
http://security.gentoo.org/
Severity: High Title: CUPS: Multiple vulnerabilities Date: April 01, 2008 Bugs: #211449, #212364, #214068 ID: 200804-01
Synopsis
Multiple vulnerabilities have been discovered in CUPS, allowing for the remote execution of arbitrary code and a Denial of Service.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-print/cups < 1.2.12-r7 >= 1.2.12-r7
Description
Multiple vulnerabilities have been reported in CUPS:
-
regenrecht (VeriSign iDefense) discovered that the cgiCompileSearch() function used in several CGI scripts in CUPS' administration interface does not correctly calculate boundaries when processing a user-provided regular expression, leading to a heap-based buffer overflow (CVE-2008-0047).
-
Tomas Hoger (Red Hat) reported that the gif_read_lzw() function uses the code_size value from GIF images without properly checking it, leading to a buffer overflow (CVE-2008-1373).
Workaround
There is no known workaround at this time.
Resolution
All CUPS users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-print/cups-1.2.12-r7"
References
[ 1 ] CVE-2008-0047 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0047 [ 2 ] CVE-2008-0053 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0053 [ 3 ] CVE-2008-0882 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0882 [ 4 ] CVE-2008-1373 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200804-01.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us.
License
Copyright 2008 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200803-0013", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cups", "scope": "eq", "trust": 1.8, "vendor": "cups", "version": "1.3.5" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.2" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.2" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "turbolinux appliance server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "1.0 (hosting)" }, { "model": "turbolinux appliance server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "1.0 (workgroup)" }, { "model": "turbolinux appliance server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "2.0" }, { "model": "turbolinux appliance server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "3.0" }, { "model": "turbolinux appliance server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "3.0 (x64)" }, { "model": "turbolinux fuji", "scope": null, "trust": 0.8, "vendor": "turbo linux", "version": null }, { "model": "turbolinux multimedia", "scope": null, "trust": 0.8, "vendor": "turbo linux", "version": null }, { "model": "turbolinux personal", "scope": null, "trust": 0.8, "vendor": "turbo linux", "version": null }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10 (x64)" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "11" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "11 (x64)" }, { "model": "wizpy", "scope": null, "trust": 0.8, "vendor": "turbo linux", "version": null }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "mac os server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "x10.5.2" }, { "model": "mac os x server", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "10.5.2" }, { "model": "mac os x", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "10.5.2" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.10" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.3" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.4" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "11x64" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.0" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.21" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "3.0" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "11" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.4-5" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.3.5" }, { "model": "personal", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.4-2" }, { "model": "appliance server hosting edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.14" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.1" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.10" }, { "model": "net-print/cups 1.2.12-r6", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.13" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "2.0" }, { "model": "software products cups rc5", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.19" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.1" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.4-3" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.22" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.18" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.0" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.12" }, { "model": "fuji", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "appliance server workgroup edition", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "1.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "software products cups rc1", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.22" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.9" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "fedora", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.6" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.2.12" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.17" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.1" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "10.2" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.23" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.20" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "appliance server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "3.0x64" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "server", "scope": "eq", "trust": 0.3, "vendor": "turbolinux", "version": "10.0.0x64" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.7" }, { "model": "software products cups rc1", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.23" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.16" }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.19" }, { "model": "multimedia", "scope": null, "trust": 0.3, "vendor": "turbolinux", "version": null }, { "model": "software products cups", "scope": "eq", "trust": 0.3, "vendor": "easy", "version": "1.1.15" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "directory pro", "scope": "eq", "trust": 0.3, "vendor": "cosmicperl", "version": "10.0.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.03" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.10" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.9" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.8" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1.5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.4.11" } ], "sources": [ { "db": "BID", "id": "28307" }, { "db": "BID", "id": "28304" }, { "db": "JVNDB", "id": "JVNDB-2008-001226" }, { "db": "CNNVD", "id": "CNNVD-200803-275" }, { "db": "NVD", "id": "CVE-2008-0047" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cups:cups:1.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2008-0047" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "regenrecht", "sources": [ { "db": "BID", "id": "28307" }, { "db": "CNNVD", "id": "CNNVD-200803-275" } ], "trust": 0.9 }, "cve": "CVE-2008-0047", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2008-0047", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-30172", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2008-0047", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200803-275", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-30172", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-30172" }, { "db": "JVNDB", "id": "JVNDB-2008-001226" }, { "db": "CNNVD", "id": "CNNVD-200803-275" }, { "db": "NVD", "id": "CVE-2008-0047" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions. CUPS is prone to a remote buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. Failed exploit attempts will result in a denial of service. \nCUPS 1.3.5 is reported vulnerable; other versions may be affected as well. Apple Mac OS X is prone to multiple security vulnerabilities. \nThese issues affect Mac OS X and various applications, including AFP Client, AFP Server, AppKit, Application Firewall, CoreFoundation, CoreServices, CUPS, Foundation, Help Viewer, Image Raw, libc, mDNSResponder, notifyd, pax archive utility, Podcast Producer, Preview, Printing, System Configuration, UDF, and Wiki Server. \nAttackers may exploit these issues to execute arbitrary code, trigger denial-of-service conditions, escalate privileges, and potentially compromise vulnerable computers. \nThese issues affect Apple Mac OS X 10.4.11, 10.4.11 Server, 10.5.2, 10.5.2 Server and earlier. \nNOTE: This BID is being retired. The following individual records have been created to fully document all the vulnerabilities that were described in this BID:\n28320 Apple Mac OS X AFP Client \u0027afp://\u0027 URI Remote Code Execution Vulnerability CVE-2008-0044. \n28323 Apple Mac OS X AFP Server Cross-Realm Authentication Bypass Vulnerability CVE-2008-0994\n28388 Apple Mac OS X AppKit NSDocument API\u0027s Stack Based Buffer Overflow Vulnerability CVE-2008-0048\n28340 Apple Mac OS X AppKit Bootstrap Namespace Local Privilege Escalation Vulnerability CVE-2008-0049\n28358 Apple Mac OS X AppKit Legacy Serialization Kit Multiple Integer Overflow Vulnerabilities CVE-2008-0057\n28364 Apple Mac OS X AppKit PPD File Stack Buffer Overflow Vulnerability CVE-2008-0997\n28368 Apple Mac OS X Application Firewall German Translation Insecure Configuration Weakness CVE-2008-0046\n28375 Apple Mac OS X CoreFoundation Time Zone Data Local Privilege Escalation Vulnerability CVE-2008-0051\n28384 Apple Mac OS X CoreServices \u0027.ief\u0027 Files Security Policy Violation Weakness CVE-2008-0052\n28334 CUPS Multiple Unspecified Input Validation Vulnerabilities\n28341 Apple Mac OS X Foundation \u0027NSSelectorFromString\u0027 Input Validation Vulnerability\n28343 Apple Mac OS X Foundation NSFileManager Insecure Directory Local Privilege Escalation Vulnerability\n28357 Apple Mac OS X Foundation \u0027NSFileManager\u0027 Stack-Based Buffer Overflow Vulnerability\n28359 Apple Mac OS X Foundation \u0027NSURLConnection\u0027 Cache Management Race Condition Security Vulnerability\n28363 Apple Mac OS X Image RAW Stack-Based Buffer Overflow Vulnerability\n28367 Apple Mac OS X Foundation \u0027NSXML\u0027 XML File Processing Race Condition Security Vulnerability\n28371 Apple Mac OS X Help Viewer Remote Applescript Code Execution Vulnerability\n28374 Apple Mac OS X libc \u0027strnstr(3)\u0027 Off-By-One Denial of Service Vulnerability\n28387 Apple Mac OS X Printing To PDF Insecure Encryption Weakness\n28386 Apple Mac OS X Preview PDF Insecure Encryption Weakness\n28389 Apple Mac OS X Universal Disc Format Remote Denial of Service Vulnerability\n28385 Apple Mac OS X NetCfgTool Local Privilege Escalation Vulnerability\n28365 Apple Mac OS X pax Archive Utility Remote Code Execution Vulnerability\n28344 Apple Mac OS X Authenticated Print Queue Information Disclosure Vulnerability\n28345 Apple Mac OS X \u0027notifyd\u0027 Local Denial of Service Vulnerability\n28372 Apple Mac OS X Podcast Producer Podcast Capture Information Disclosure Vulnerability\n28339 Apple Mac OS X mDNSResponderHelper Local Format String Vulnerability. The system is based on the Internet Printing Protocol (IPP) and provides most PostScript and raster printer services. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1530-1 security@debian.org\nhttp://www.debian.org/security/ Noah Meyerhans\nMarch 25, 2008 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : cupsys\nVulnerability : multiple\nProblem type : remote\nDebian-specific: no\nCVE Id(s) : CVE-2008-0047 CVE-2008-0882\nDebian Bug : 472105 467653\n\nSeveral local/remote vulnerabilities have been discovered in cupsys, the\nCommon Unix Printing System. \n\nFor the stable distribution (etch), these problems have been fixed in\nversion 1.2.7-4etch3\n\nWe recommend that you upgrade your cupsys packages. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\nDebian GNU/Linux 4.0 alias etch \n- - ------------------------------- \n\nStable updates are available for alpha, amd64, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3.diff.gz\n Size/MD5 checksum: 104776 b684811e24921a7574798108ac6988d7\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3.dsc\n Size/MD5 checksum: 1084 0276f8e59e00181d39d204a28494d18c\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7.orig.tar.gz\n Size/MD5 checksum: 4214272 c9ba33356e5bb93efbcf77b6e142e498\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-common_1.2.7-4etch3_all.deb\n Size/MD5 checksum: 927322 65b1ff3cb7b8bbbe3b334ee43875aac4\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4etch3_all.deb\n Size/MD5 checksum: 45654 0b4ce3e9c2af460c5b694b906f450b12\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_alpha.deb\n Size/MD5 checksum: 1097006 45800a6b2c1dd7068843ade84480259d\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_alpha.deb\n Size/MD5 checksum: 39262 4f645e439999611b07348ad50e4da57d\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_alpha.deb\n Size/MD5 checksum: 174890 9affa7a1f2dc6548fcffb9a456181a3a\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_alpha.deb\n Size/MD5 checksum: 86292 23431d4bfae9599caba759d4b0a3a8c0\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_alpha.deb\n Size/MD5 checksum: 94814 6be946280a3c9fadfd070f7284255df0\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_alpha.deb\n Size/MD5 checksum: 1609104 ecdd9f65f8799605a1efeac0d4eae774\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_alpha.deb\n Size/MD5 checksum: 184372 7720c886672d63cdeb501314beacc4b5\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_alpha.deb\n Size/MD5 checksum: 72428 2b4ed65a0a33b7cf32756c2b0cd925de\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_amd64.deb\n Size/MD5 checksum: 52858 badd0d21043714aa2c612b45323890a1\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_amd64.deb\n Size/MD5 checksum: 1574654 cf1c04e898f7380fdd338ecafb69185e\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_amd64.deb\n Size/MD5 checksum: 85652 24c3d3e054306785ccc958f1894a2b18\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_amd64.deb\n Size/MD5 checksum: 142534 7ad95206e0e450f8df27c9d858809ddb\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_amd64.deb\n Size/MD5 checksum: 162008 44f8d076b07194023c8ef4348a56e97a\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_amd64.deb\n Size/MD5 checksum: 36352 5a4f9dc02fa0f8fb6936859c0fb1bd61\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_amd64.deb\n Size/MD5 checksum: 1086740 d466f2f5d8cb17ae0013dd99db5bcbb0\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_amd64.deb\n Size/MD5 checksum: 80704 d45a4a7461defd4c6b96bbfc292e3183\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_i386.deb\n Size/MD5 checksum: 1565044 7c19a56cb4a782487e104a01f31e0b47\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_i386.deb\n Size/MD5 checksum: 37600 fa90419b34b6733ef32f13797e4606f3\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_i386.deb\n Size/MD5 checksum: 79892 7460f7b76d597bcb02bdc0fe5897a32a\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_i386.deb\n Size/MD5 checksum: 86674 aebef9f4a309afdff01a7cce17b6f57b\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_i386.deb\n Size/MD5 checksum: 997608 e754dc8df237302fac7019754e42352b\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_i386.deb\n Size/MD5 checksum: 53418 b45cf2a324d52524244351d213c8be41\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_i386.deb\n Size/MD5 checksum: 137686 b726701fdb3e8948e5111e2e831bf853\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_i386.deb\n Size/MD5 checksum: 160080 c029e686ec624c2fdf156f885d1daf5c\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_ia64.deb\n Size/MD5 checksum: 1770478 73e7565983c31c3e651dd55acb38c0c7\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_ia64.deb\n Size/MD5 checksum: 203722 9d2b9b9d1c3999a3f4ccf7e5e446bd1a\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_ia64.deb\n Size/MD5 checksum: 1107480 d0898394febd60b7bf80e1e4ff335a39\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_ia64.deb\n Size/MD5 checksum: 73934 5156c8db255299aa66053bb4415cde19\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_ia64.deb\n Size/MD5 checksum: 106208 db2ad0519d15ee795758f72b3c093068\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_ia64.deb\n Size/MD5 checksum: 106220 8228fb0ccf8cc888973731f2aa72c8c4\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_ia64.deb\n Size/MD5 checksum: 192358 c1ee340a3e893b3f22adb138923167c2\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_ia64.deb\n Size/MD5 checksum: 46324 771aaa1b244d01eacdd62e8e963d434f\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_mips.deb\n Size/MD5 checksum: 86208 03d9d365f1c41e2efc36fc1a19dcb813\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_mips.deb\n Size/MD5 checksum: 1096636 65217c4fc57a23e065c9da14dfad6c9d\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_mips.deb\n Size/MD5 checksum: 1567240 46f2194418cb1d5800c44ae13bcd51ee\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_mips.deb\n Size/MD5 checksum: 57520 02e313bad869d4c50a6dde506765633b\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_mips.deb\n Size/MD5 checksum: 157528 f42c10ade950e4faa4403da4e8d740c4\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_mips.deb\n Size/MD5 checksum: 76156 d4778055a8900dcb6eaf2100a8172b63\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_mips.deb\n Size/MD5 checksum: 150976 5c00fd263eb81453450af5d5e79fe5b4\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_mips.deb\n Size/MD5 checksum: 36114 4ba209d715050a942d0c9025869378fe\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_mipsel.deb\n Size/MD5 checksum: 86404 41a26e5e4196385e67dddee0337c0ade\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_mipsel.deb\n Size/MD5 checksum: 158050 1b5af4a50dcfe41ec2b35af9a47d40b3\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_mipsel.deb\n Size/MD5 checksum: 36060 09d1cfdfb2e925b3f846d22cf760ba11\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_mipsel.deb\n Size/MD5 checksum: 1552652 67cf88cac0c510bec526c49025d7cbe0\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_mipsel.deb\n Size/MD5 checksum: 1084290 082931629866ea5a6aba940997698af7\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_mipsel.deb\n Size/MD5 checksum: 57694 6e120d7fc4a6643eb208333b30e7c5c9\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_mipsel.deb\n Size/MD5 checksum: 77448 f411d88639ee78a68d46ece45e91368f\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_mipsel.deb\n Size/MD5 checksum: 150900 09be1543e6cd767098a3af2a70791036\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_powerpc.deb\n Size/MD5 checksum: 136866 623ea75ab7f6603f9ddc9276389c90ea\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_powerpc.deb\n Size/MD5 checksum: 162686 5766c22ea9cad4f8e5acbf8dd6ad48f6\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_powerpc.deb\n Size/MD5 checksum: 87910 767921a7b2ed329a3107da1f0dbb7dda\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_powerpc.deb\n Size/MD5 checksum: 41298 875908633ca26db04739a334b03c42c2\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_powerpc.deb\n Size/MD5 checksum: 89998 0c81d4c99f07d7b0cdcd91a2a9a6ad28\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_powerpc.deb\n Size/MD5 checksum: 51788 87423f593d57c4c9d0cc80cfafa28f87\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_powerpc.deb\n Size/MD5 checksum: 1142146 6c4479057269b64596d123d5cf859747\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_powerpc.deb\n Size/MD5 checksum: 1575696 eb08aafdd1c60d707b874a31dcab67b4\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_s390.deb\n Size/MD5 checksum: 166184 d748308d0a477ad16a42e25671f49dd9\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_s390.deb\n Size/MD5 checksum: 37422 6a3f5390f4ff82bd1c8ef4d64f0fcc46\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_s390.deb\n Size/MD5 checksum: 1036106 08ad799adaeb1ccd9538048e685d69d6\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_s390.deb\n Size/MD5 checksum: 87194 e881e70f5b31b800989f14fd4e97368f\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_s390.deb\n Size/MD5 checksum: 52256 ec508d448806c889b0c79aed8d95cc3e\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_s390.deb\n Size/MD5 checksum: 82340 c9ab3bc26da68abdde50d365b4224434\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_s390.deb\n Size/MD5 checksum: 144934 61cf1f32851be64340ffb36b266ee0a7\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_s390.deb\n Size/MD5 checksum: 1586624 1921d0bc3b7b03d4ed952ecb4b0b561b\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_sparc.deb\n Size/MD5 checksum: 78500 74d7872d04914d26d5a4baa768437603\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_sparc.deb\n Size/MD5 checksum: 51572 93fd782dbbc7148c9f96b18ad7ebe111\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_sparc.deb\n Size/MD5 checksum: 84622 6eb7012156c87266af9802d38f1dd366\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_sparc.deb\n Size/MD5 checksum: 158596 68ca94de2c329c162ae40ac5b79af29b\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_sparc.deb\n Size/MD5 checksum: 36018 61ffbfc960bea5c6fda52ffefa8886b7\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_sparc.deb\n Size/MD5 checksum: 991000 3135666aadf8d4f4cd273fbd7d50cfca\n http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_sparc.deb\n Size/MD5 checksum: 139570 e281ec84c08bcac3f54d5017b6917e0b\n http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_sparc.deb\n Size/MD5 checksum: 1561792 21cd9a3e1e89ba96aa11890858194b82\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.6 (GNU/Linux)\n\niD8DBQFH6RVAYrVLjBFATsMRAozSAJ9kTMEJ+adGZ1Sn0N6kOyhCmJU0HACeK7Xp\n2NTRUT1F1Cu9Xrm9EGvmg3M=\n=Fgu/\n-----END PGP SIGNATURE-----\n. =========================================================== \nUbuntu Security Notice USN-598-1 April 02, 2008\ncupsys vulnerabilities\nCVE-2008-0047, CVE-2008-0053, CVE-2008-0882, CVE-2008-1373\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 6.10\nUbuntu 7.04\nUbuntu 7.10\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n cupsys 1.2.2-0ubuntu0.6.06.8\n\nUbuntu 6.10:\n cupsys 1.2.4-2ubuntu3.3\n\nUbuntu 7.04:\n cupsys 1.2.8-0ubuntu8.3\n\nUbuntu 7.10:\n cupsys 1.3.2-1ubuntu7.6\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes. \n\nDetails follow:\n\nIt was discovered that the CUPS administration interface contained a heap-\nbased overflow flaw. A local attacker, and a remote attacker if printer\nsharing is enabled, could send a malicious request and possibly execute\narbitrary code as the non-root user in Ubuntu 6.06 LTS, 6.10, and 7.04. \nIn Ubuntu 7.10, attackers would be isolated by the AppArmor CUPS profile. \n(CVE-2008-0047)\n\nIt was discovered that the hpgl filter in CUPS did not properly validate\nits input when parsing parameters. In Ubuntu 7.10, attackers would be\nisolated by the AppArmor CUPS profile. (CVE-2008-0053)\n\nIt was discovered that CUPS had a flaw in its managing of remote shared\nprinters via IPP. A remote attacker could send a crafted UDP packet and\ncause a denial of service or possibly execute arbitrary code as the\nnon-root user in Ubuntu 6.06 LTS, 6.10, and 7.04. In Ubuntu 7.10,\nattackers would be isolated by the AppArmor CUPS profile. (CVE-2008-0882)\n\nIt was discovered that CUPS did not properly perform bounds checking in\nits GIF decoding routines. If a crafted GIF file were printed, an attacker\ncould possibly execute arbitrary code as the non-root user in Ubuntu 6.06\nLTS, 6.10, and 7.04. In Ubuntu 7.10, attackers would be isolated by the\nAppArmor CUPS profile. (CVE-2008-1373)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8.diff.gz\n Size/MD5: 97650 b7ac4b760066920314d4596541cf716e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8.dsc\n Size/MD5: 1049 26e617c4b5c0848d56f872895e279a86\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2.orig.tar.gz\n Size/MD5: 4070384 2c99b8aa4c8dc25c8a84f9c06aa52e3e\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-gnutls10_1.2.2-0ubuntu0.6.06.8_all.deb\n Size/MD5: 998 c7d4013c3b9e3655e2fd2e9719d4d2af\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.8_amd64.deb\n Size/MD5: 36218 9eff8fd692afe5ae17ca80f269a0ca6b\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.8_amd64.deb\n Size/MD5: 81906 ac05150f42e5671c5cdc73ba8f85cb5b\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8_amd64.deb\n Size/MD5: 2286026 acd4a48c676556fc7260bbd86db0416b\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.8_amd64.deb\n Size/MD5: 6096 3df7829bfb8766de94a4ef2ff0be824f\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.8_amd64.deb\n Size/MD5: 76654 0d67c8599d4e2accf4f7ee31b498fdc7\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.8_amd64.deb\n Size/MD5: 25758 14617ef9d38146ceaf89b4e9775e2fb4\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.8_amd64.deb\n Size/MD5: 129498 5cd8c821b31dddde0c200a61570d48b6\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.8_i386.deb\n Size/MD5: 34766 88ac5bced1d508f9695b4b4f4ae0f82a\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.8_i386.deb\n Size/MD5: 77988 84db3f3ad17936d5015a26353c55bc6a\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8_i386.deb\n Size/MD5: 2253492 2cc1ec94caf6344a555ece9f69b51fe2\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.8_i386.deb\n Size/MD5: 6088 00226da0a854f64bd5b18ace219de031\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.8_i386.deb\n Size/MD5: 75744 73038a225d7301b4b5f8085219c97c81\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.8_i386.deb\n Size/MD5: 25740 52699a4b9dea621f4332db5856f8b574\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.8_i386.deb\n Size/MD5: 121718 2e904399c40c9f83e451bb2e964820c1\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.8_powerpc.deb\n Size/MD5: 40464 7e6bd3ec6312eef104737ffed5e19c3c\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.8_powerpc.deb\n Size/MD5: 89542 8b9353d17d9402495f2404a9ab837b92\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8_powerpc.deb\n Size/MD5: 2300680 65597d07917b8753a0af6f6aae1276db\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.8_powerpc.deb\n Size/MD5: 6096 d6cb4780e6f4545bc8566cce92fb8346\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.8_powerpc.deb\n Size/MD5: 78442 c75b4f47491227c2504649902a040855\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.8_powerpc.deb\n Size/MD5: 25742 372a1c972e97e1722a844430780ae6c5\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.8_powerpc.deb\n Size/MD5: 127478 afad79a272bbe434675f24d7a3ca91ef\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.8_sparc.deb\n Size/MD5: 35396 b44ad7e913ff064d2a3fb73121771686\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.8_sparc.deb\n Size/MD5: 78724 a8bff0942be4b14ece6dde8fd38b6f5a\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8_sparc.deb\n Size/MD5: 2287122 2415f6a5410a63b98ba32ecdf8fbcfb7\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.8_sparc.deb\n Size/MD5: 6094 384dc8a7b9c8dfbefa42d7b5fbb836c7\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.8_sparc.deb\n Size/MD5: 75678 6258f4d4c1b55d90b34cee1caa12dc35\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.8_sparc.deb\n Size/MD5: 25740 ca7f1a4412f42d739d51c1ddbc09045a\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.8_sparc.deb\n Size/MD5: 123214 801292f8a2652b579a82b7a7c52e9ffd\n\nUpdated packages for Ubuntu 6.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3.diff.gz\n Size/MD5: 111410 fb84af4bcf007f2f7299394e0be32412\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3.dsc\n Size/MD5: 1059 430be555857b7aa5cc01431466487aaf\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4.orig.tar.gz\n Size/MD5: 4091480 46722ad2dc78b12b5c05db2d080fe784\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.2.4-2ubuntu3.3_all.deb\n Size/MD5: 870052 97e82b21269a8bb5e7ac995cc4cb665d\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.4-2ubuntu3.3_amd64.deb\n Size/MD5: 36706 eb308fea40f4b7d159304b4b875b2329\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.4-2ubuntu3.3_amd64.deb\n Size/MD5: 82506 3b04032674acc75d3184f537af144d3a\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3_amd64.deb\n Size/MD5: 1480680 18b1537c8238b225e6ba2bb51570b942\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.4-2ubuntu3.3_amd64.deb\n Size/MD5: 6122 b324305be458b5207d242efc230d06c1\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.4-2ubuntu3.3_amd64.deb\n Size/MD5: 95522 fce843ba1e5c51ec7a8161f0a0828acc\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.4-2ubuntu3.3_amd64.deb\n Size/MD5: 26138 041e52bad239d993b22d65873705a751\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.4-2ubuntu3.3_amd64.deb\n Size/MD5: 172282 cf3fd3c84c83b36aa453ca2e071ab74c\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.4-2ubuntu3.3_i386.deb\n Size/MD5: 36260 c2daeb19fee1ebfe794be09ebefef1c7\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.4-2ubuntu3.3_i386.deb\n Size/MD5: 80108 c599f739a103867967a78f91569db74e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3_i386.deb\n Size/MD5: 1463912 d22879a24e9f1ff1d12e7845ad596cc2\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.4-2ubuntu3.3_i386.deb\n Size/MD5: 6124 01628551a9fc66423789f02853d0d9ba\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.4-2ubuntu3.3_i386.deb\n Size/MD5: 95352 b6084c36087da3aa1a3c8d44f9a9d0a7\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.4-2ubuntu3.3_i386.deb\n Size/MD5: 26142 838499ddbf886c5514ef11c6e4bdeda9\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.4-2ubuntu3.3_i386.deb\n Size/MD5: 169404 8262471b1cdb9991fbde554a31c74508\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.4-2ubuntu3.3_powerpc.deb\n Size/MD5: 41802 b703ca8629e5df46fc1f1d45acd20581\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.4-2ubuntu3.3_powerpc.deb\n Size/MD5: 91148 caca2486db7794b133539af9b939a607\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3_powerpc.deb\n Size/MD5: 1498496 0662d077dfae2d1b6b00db7a0966366b\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.4-2ubuntu3.3_powerpc.deb\n Size/MD5: 6128 792c5ee645b0f7a7e1d63d9206348c52\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.4-2ubuntu3.3_powerpc.deb\n Size/MD5: 97682 b37660eb88a487e5f7c49b9ed6f1c937\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.4-2ubuntu3.3_powerpc.deb\n Size/MD5: 26144 b834556e6374093f5652754dd8c0ff6a\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.4-2ubuntu3.3_powerpc.deb\n Size/MD5: 172694 3174ff36eaa0bc4ac7f4df02299413ca\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.4-2ubuntu3.3_sparc.deb\n Size/MD5: 36292 2cd1ea5a42eff193ca8a4c2ec53aefa1\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.4-2ubuntu3.3_sparc.deb\n Size/MD5: 80238 10b95fff38cb0436cf30a30e683cc27d\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3_sparc.deb\n Size/MD5: 1489214 119f077088e3b2009c896fd395448717\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.4-2ubuntu3.3_sparc.deb\n Size/MD5: 6128 204a14898a9508a980e71d33792cfb59\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.4-2ubuntu3.3_sparc.deb\n Size/MD5: 94574 a87580c3fd22da592dd5496190afb871\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.4-2ubuntu3.3_sparc.deb\n Size/MD5: 26142 e7b959209cad884220bb1cacb2cd0555\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.4-2ubuntu3.3_sparc.deb\n Size/MD5: 168700 1f717ec06409999b5a40bb89dcedb5b0\n\nUpdated packages for Ubuntu 7.04:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3.diff.gz\n Size/MD5: 156263 0147ec4c77b27e20df2a3ad514c2dd8e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3.dsc\n Size/MD5: 1143 7fb2ad1b1c8e57b09805fc9d6c1e027d\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8.orig.tar.gz\n Size/MD5: 4293194 107affe95fcf1cd4aaed4a5c73f4b91f\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.2.8-0ubuntu8.3_all.deb\n Size/MD5: 926414 97df229c931f7eb05af5a5cb623635ae\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.8-0ubuntu8.3_amd64.deb\n Size/MD5: 37412 20fb406aae21e63dc8c9723e178505af\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.8-0ubuntu8.3_amd64.deb\n Size/MD5: 83238 9aa9eb876585e32757c83783d79b0a02\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3_amd64.deb\n Size/MD5: 1638304 7673386b3a9d63c09bd3647cf5dad877\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.8-0ubuntu8.3_amd64.deb\n Size/MD5: 56378 32e2acb4fe5ef7aab8b8896a8d40166c\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.8-0ubuntu8.3_amd64.deb\n Size/MD5: 104324 649109ddb522145730c67b93a870eefe\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.8-0ubuntu8.3_amd64.deb\n Size/MD5: 144860 c0fb60ebae640e565607f0cdfd7094b7\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.8-0ubuntu8.3_amd64.deb\n Size/MD5: 182344 204887dda2791a61417415c4466a51d7\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.8-0ubuntu8.3_i386.deb\n Size/MD5: 36722 22030307f71a44ca7b30921aef0bf46a\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.8-0ubuntu8.3_i386.deb\n Size/MD5: 80738 c92706978d65b9a409d93e704c5662b4\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3_i386.deb\n Size/MD5: 1620944 bc9a1e338567e27aee10cded16abbcc2\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.8-0ubuntu8.3_i386.deb\n Size/MD5: 55472 15cd34697cca79ee83498691da531d37\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.8-0ubuntu8.3_i386.deb\n Size/MD5: 104028 3d13c92bf5f0c9a26f3a8ba534dc6dec\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.8-0ubuntu8.3_i386.deb\n Size/MD5: 139332 c33597e3bbce0d41df0efe84c2b59377\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.8-0ubuntu8.3_i386.deb\n Size/MD5: 178604 a93713bb9b422a0460d42dc35eb7f8b3\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.8-0ubuntu8.3_powerpc.deb\n Size/MD5: 46768 682b1e104c73d8820a5b39ba79de7883\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.8-0ubuntu8.3_powerpc.deb\n Size/MD5: 101104 78dcf70528f5682b2499efa0b03f6a42\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3_powerpc.deb\n Size/MD5: 1695542 06c8b6b43afa525b07718d410eed6438\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.8-0ubuntu8.3_powerpc.deb\n Size/MD5: 56226 27ce8328e4cfc184ef64fdfe5bcf1b45\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.8-0ubuntu8.3_powerpc.deb\n Size/MD5: 109886 607c9d1bdc4eaf3627031f98f59948be\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.8-0ubuntu8.3_powerpc.deb\n Size/MD5: 141172 501aee8031dd71ce2166e79bfca04129\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.8-0ubuntu8.3_powerpc.deb\n Size/MD5: 188236 ccbcdb277477728c10dac36435924085\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.8-0ubuntu8.3_sparc.deb\n Size/MD5: 37788 7da1fb58e7d4b6bfd71ed47b1ba5d201\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.8-0ubuntu8.3_sparc.deb\n Size/MD5: 83750 69a59033ea6458f3f82046aee46ba4bb\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3_sparc.deb\n Size/MD5: 1658908 b35167112445c8bc3c1281604412f534\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.8-0ubuntu8.3_sparc.deb\n Size/MD5: 54756 b877de97919e00870c84850b1e074555\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.8-0ubuntu8.3_sparc.deb\n Size/MD5: 103574 204efb55b2d46f00cd4f8ddc429d805f\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.8-0ubuntu8.3_sparc.deb\n Size/MD5: 141742 5e411c3199e1a1296dbd7cd7c6958e1a\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.8-0ubuntu8.3_sparc.deb\n Size/MD5: 177884 4e1b218fd113193e4cf149aea90ec6c7\n\nUpdated packages for Ubuntu 7.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6.diff.gz\n Size/MD5: 125298 81ae6b42c7dd12a1797a63d19c644a8c\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6.dsc\n Size/MD5: 1218 c56faedc440fc2b16f9a1f396a607d1e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2.orig.tar.gz\n Size/MD5: 4848424 9e3e1dee4d872fdff0682041198d3d73\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.3.2-1ubuntu7.6_all.deb\n Size/MD5: 1080444 5d01f105292a526744e5622a14a9aed4\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.6_amd64.deb\n Size/MD5: 37204 c3425972caa02e7a25321f49d47c6f9b\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.6_amd64.deb\n Size/MD5: 89504 5411f2454e0d2a0323e9951cb15a534d\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6_amd64.deb\n Size/MD5: 2034570 c8d6548bd1ba7cb841b196e762da492c\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.6_amd64.deb\n Size/MD5: 59890 150d59889adc8fd0cb185989876a355d\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.6_amd64.deb\n Size/MD5: 46780 e15952781e93e862194d453320605bbc\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.6_amd64.deb\n Size/MD5: 152020 32c671873dfad4e39104da5c3a6e935e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.6_amd64.deb\n Size/MD5: 186028 1a1404a7d67078e31c8819bf3d8d4dae\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.6_i386.deb\n Size/MD5: 36476 a982fce3918a91c74e92fb515f1c6d65\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.6_i386.deb\n Size/MD5: 86484 0e4d80917e070f7b2f109de81f96bc4d\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6_i386.deb\n Size/MD5: 2018116 cff3abb1b69d797d616e73c93885de3a\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.6_i386.deb\n Size/MD5: 58634 6d2590c49af04215519a87e857463652\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.6_i386.deb\n Size/MD5: 46140 0ebe76bdf799336e0b2d01d0a0eca72c\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.6_i386.deb\n Size/MD5: 145694 6766e6515de26b782e211840f330b93e\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.6_i386.deb\n Size/MD5: 182802 c62bc1107e748c200e6969a239ae8b9b\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.6_powerpc.deb\n Size/MD5: 46498 044a54c557dd4006bb40a13dd2c2b156\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.6_powerpc.deb\n Size/MD5: 107752 76e4020feb1778e713389fc6bdb86ea9\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6_powerpc.deb\n Size/MD5: 2099222 73d517a40d877a238856a232e6be64c9\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.6_powerpc.deb\n Size/MD5: 59342 8530840cf85bf44c8803fd064b61e1f7\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.6_powerpc.deb\n Size/MD5: 51716 9d30c790a4b94ac07670d7e15c2e41ab\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.6_powerpc.deb\n Size/MD5: 146948 f73327e30e2778bdcf4543c04855e6a1\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.6_powerpc.deb\n Size/MD5: 191752 46d534c4c477657ab03419d18f91728f\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.6_sparc.deb\n Size/MD5: 37564 1771f3f6f2ceb1864696801f7f420e93\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.6_sparc.deb\n Size/MD5: 89606 69149447dbd4e3b36185bd977202f837\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6_sparc.deb\n Size/MD5: 2060610 ed932d7ee05e745bc0af647d361e7d99\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.6_sparc.deb\n Size/MD5: 57900 7369866ac9adb6abd966e2d1e2f95b42\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.6_sparc.deb\n Size/MD5: 45440 60eda5d4cc12eb2c35817d6c0d4ef43a\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.6_sparc.deb\n Size/MD5: 148476 8e1d119a91b8c6d8d15032b27a498235\n http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.6_sparc.deb\n Size/MD5: 181842 8283739361474f00d65f9bf52d7c0e3d\n\n\n. \n \n Finally, a vulnerability in how CUPS handled GIF files was found by\n Tomas Hoger of Red Hat, similar to previous issues corrected in PHP,\n gd, tk, netpbm, and SDL_image (CVE-2008-1373). \n \n The updated packages have been patched to correct these issues. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0047\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0053\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2007.0:\n 4ecbfe664ba6820bf06dc406133e265c 2007.0/i586/cups-1.2.4-1.8mdv2007.0.i586.rpm\n 6d51733a95884e36cca9570738537ff6 2007.0/i586/cups-common-1.2.4-1.8mdv2007.0.i586.rpm\n abe0591d8b2b390a82dffcd2fed43b14 2007.0/i586/cups-serial-1.2.4-1.8mdv2007.0.i586.rpm\n 91ffe19d342810de71e056e213056552 2007.0/i586/libcups2-1.2.4-1.8mdv2007.0.i586.rpm\n 71fd9246da1e48b2dc6a60ceeae41e48 2007.0/i586/libcups2-devel-1.2.4-1.8mdv2007.0.i586.rpm\n bd0f3b69fe5dc7bddd6c121200db014d 2007.0/i586/php-cups-1.2.4-1.8mdv2007.0.i586.rpm \n cb50a10a1096424175c1a49e8e22a8a1 2007.0/SRPMS/cups-1.2.4-1.8mdv2007.0.src.rpm\n\n Mandriva Linux 2007.0/X86_64:\n d9423a942f4f779959cfe489866b52f5 2007.0/x86_64/cups-1.2.4-1.8mdv2007.0.x86_64.rpm\n 8b13ba591a7dc53c658876dae447ce17 2007.0/x86_64/cups-common-1.2.4-1.8mdv2007.0.x86_64.rpm\n 9e434edde16c05fded1b706adaae859d 2007.0/x86_64/cups-serial-1.2.4-1.8mdv2007.0.x86_64.rpm\n 9733f3116c8488148471af3d5bdafd16 2007.0/x86_64/lib64cups2-1.2.4-1.8mdv2007.0.x86_64.rpm\n fbb5010088c23aa2cf635875179adc3c 2007.0/x86_64/lib64cups2-devel-1.2.4-1.8mdv2007.0.x86_64.rpm\n 00e05d49f33ef5d0067287ef1a27246c 2007.0/x86_64/php-cups-1.2.4-1.8mdv2007.0.x86_64.rpm \n cb50a10a1096424175c1a49e8e22a8a1 2007.0/SRPMS/cups-1.2.4-1.8mdv2007.0.src.rpm\n\n Mandriva Linux 2007.1:\n dc81f96bd48732eed770b0090b333695 2007.1/i586/cups-1.2.10-2.6mdv2007.1.i586.rpm\n 3545d312400a8f5aad55e323d2ff3543 2007.1/i586/cups-common-1.2.10-2.6mdv2007.1.i586.rpm\n f4656b26df51f63813a49006415a783b 2007.1/i586/cups-serial-1.2.10-2.6mdv2007.1.i586.rpm\n ab1869c8ddeda927fdfbc49c386756f1 2007.1/i586/libcups2-1.2.10-2.6mdv2007.1.i586.rpm\n 5de192ed26380212896fcd376a1b3e23 2007.1/i586/libcups2-devel-1.2.10-2.6mdv2007.1.i586.rpm\n a347c58fc3e76e064cabf8425d0245ab 2007.1/i586/php-cups-1.2.10-2.6mdv2007.1.i586.rpm \n 15c9274e61f9dbe98150fa1ae58ef7bc 2007.1/SRPMS/cups-1.2.10-2.6mdv2007.1.src.rpm\n\n Mandriva Linux 2007.1/X86_64:\n 1faa57f00d0577f6d25cddf7fccd7edb 2007.1/x86_64/cups-1.2.10-2.6mdv2007.1.x86_64.rpm\n 26a14fabfef38f2fd4ab88c6184d4e2f 2007.1/x86_64/cups-common-1.2.10-2.6mdv2007.1.x86_64.rpm\n b5a49bfbeb004af58e1e5f9c1660dece 2007.1/x86_64/cups-serial-1.2.10-2.6mdv2007.1.x86_64.rpm\n 6b81f4e888dec6e94231b01fd5d162bf 2007.1/x86_64/lib64cups2-1.2.10-2.6mdv2007.1.x86_64.rpm\n 256313a9ac10203a7d59deb6ff0a3da0 2007.1/x86_64/lib64cups2-devel-1.2.10-2.6mdv2007.1.x86_64.rpm\n 41e268b0e9e8a5e256c9af6192dfcae0 2007.1/x86_64/php-cups-1.2.10-2.6mdv2007.1.x86_64.rpm \n 15c9274e61f9dbe98150fa1ae58ef7bc 2007.1/SRPMS/cups-1.2.10-2.6mdv2007.1.src.rpm\n\n Mandriva Linux 2008.0:\n 27ee99856a1c4448cdee618f2db8ae52 2008.0/i586/cups-1.3.6-1.1mdv2008.0.i586.rpm\n 09a6026a683b1ea029b63b0480aa2d4b 2008.0/i586/cups-common-1.3.6-1.1mdv2008.0.i586.rpm\n 7974c9c3a572a389fea83250cd57c8e1 2008.0/i586/cups-serial-1.3.6-1.1mdv2008.0.i586.rpm\n a6432e417d401b7900113763255bf8c3 2008.0/i586/libcups2-1.3.6-1.1mdv2008.0.i586.rpm\n cfb0fd68a1d60f1dfa985da0bb79190f 2008.0/i586/libcups2-devel-1.3.6-1.1mdv2008.0.i586.rpm\n aba1862f9db0e18f09d581ef0a95fde8 2008.0/i586/php-cups-1.3.6-1.1mdv2008.0.i586.rpm \n e034c775d5b04fffb14cb441b8174a55 2008.0/SRPMS/cups-1.3.6-1.1mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n b18f356dc9fc5cda784e576e3f20a801 2008.0/x86_64/cups-1.3.6-1.1mdv2008.0.x86_64.rpm\n bccc98b2ad3205d2c301036ba9d28f61 2008.0/x86_64/cups-common-1.3.6-1.1mdv2008.0.x86_64.rpm\n 1c1837c8a8eb04609daa405553ab7fe8 2008.0/x86_64/cups-serial-1.3.6-1.1mdv2008.0.x86_64.rpm\n 5748bf84c1239e2b4255446cbf6c8285 2008.0/x86_64/lib64cups2-1.3.6-1.1mdv2008.0.x86_64.rpm\n bd593d10e724d5fcb41a474ceb985996 2008.0/x86_64/lib64cups2-devel-1.3.6-1.1mdv2008.0.x86_64.rpm\n f2db5dfbb8dc8327965a45a5d88e0b6d 2008.0/x86_64/php-cups-1.3.6-1.1mdv2008.0.x86_64.rpm \n e034c775d5b04fffb14cb441b8174a55 2008.0/SRPMS/cups-1.3.6-1.1mdv2008.0.src.rpm\n\n Corporate 3.0:\n 21bb1e12de3ad442d1abcf6b748e4612 corporate/3.0/i586/cups-1.1.20-5.17.C30mdk.i586.rpm\n 0b98a618d204f1cb5d93cfc8bc17ce04 corporate/3.0/i586/cups-common-1.1.20-5.17.C30mdk.i586.rpm\n b4d7d4823f4a052f1b88de95c15fdd35 corporate/3.0/i586/cups-serial-1.1.20-5.17.C30mdk.i586.rpm\n 15ff4fca1070bde09536ef5c152f93fa corporate/3.0/i586/libcups2-1.1.20-5.17.C30mdk.i586.rpm\n 29a49e9cd1dab4afc7d4b45f756db2ec corporate/3.0/i586/libcups2-devel-1.1.20-5.17.C30mdk.i586.rpm \n 2d3ba4ca7a10c5842f6eeb6a7f847e86 corporate/3.0/SRPMS/cups-1.1.20-5.17.C30mdk.src.rpm\n\n Corporate 3.0/X86_64:\n f977134efb9f309911bfc1b4850e82f0 corporate/3.0/x86_64/cups-1.1.20-5.17.C30mdk.x86_64.rpm\n 36fff0b8424e4f651e6f055c70008521 corporate/3.0/x86_64/cups-common-1.1.20-5.17.C30mdk.x86_64.rpm\n 696c4e4cc405b9ca56f22819fa2f818b corporate/3.0/x86_64/cups-serial-1.1.20-5.17.C30mdk.x86_64.rpm\n 942d626665fe5a05f879411e7ca80030 corporate/3.0/x86_64/lib64cups2-1.1.20-5.17.C30mdk.x86_64.rpm\n e191a6945b87e3b33617a3de06561d3e corporate/3.0/x86_64/lib64cups2-devel-1.1.20-5.17.C30mdk.x86_64.rpm \n 2d3ba4ca7a10c5842f6eeb6a7f847e86 corporate/3.0/SRPMS/cups-1.1.20-5.17.C30mdk.src.rpm\n\n Corporate 4.0:\n a091b07a3a414304cf24e76ab99d3afe corporate/4.0/i586/cups-1.2.4-0.8.20060mlcs4.i586.rpm\n 4cabdbd655b65028ee5bdfb3452f4506 corporate/4.0/i586/cups-common-1.2.4-0.8.20060mlcs4.i586.rpm\n 534437dd5a286f0484df0e2cdfd9e636 corporate/4.0/i586/cups-serial-1.2.4-0.8.20060mlcs4.i586.rpm\n 0dd449c47be977964034d699749738f7 corporate/4.0/i586/libcups2-1.2.4-0.8.20060mlcs4.i586.rpm\n 6aad89786cfec35bc5e81eb3a1dc8cd4 corporate/4.0/i586/libcups2-devel-1.2.4-0.8.20060mlcs4.i586.rpm\n fc46181aa746a4f637d66681fb975560 corporate/4.0/i586/php-cups-1.2.4-0.8.20060mlcs4.i586.rpm \n 83a55c89caf98419e9f76b58c6bee2e5 corporate/4.0/SRPMS/cups-1.2.4-0.8.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 7c7624e35383c614691e4063215f8d65 corporate/4.0/x86_64/cups-1.2.4-0.8.20060mlcs4.x86_64.rpm\n 17f29e8614a988900a09305adfd1c85b corporate/4.0/x86_64/cups-common-1.2.4-0.8.20060mlcs4.x86_64.rpm\n 773484820406d7285608081cb7e262d2 corporate/4.0/x86_64/cups-serial-1.2.4-0.8.20060mlcs4.x86_64.rpm\n a53e7a817a42ccc1ac5a5daa7602c4d8 corporate/4.0/x86_64/lib64cups2-1.2.4-0.8.20060mlcs4.x86_64.rpm\n ad933e76d237bbb83bf568071566ba37 corporate/4.0/x86_64/lib64cups2-devel-1.2.4-0.8.20060mlcs4.x86_64.rpm\n 4c6d20646db4de2ab03907c9b6705067 corporate/4.0/x86_64/php-cups-1.2.4-0.8.20060mlcs4.x86_64.rpm \n 83a55c89caf98419e9f76b58c6bee2e5 corporate/4.0/SRPMS/cups-1.2.4-0.8.20060mlcs4.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.7 (GNU/Linux)\n\niD8DBQFH88NLmqjQ0CJFipgRAvgQAJ9PyMfRvtdcft3hCuqCnGg+4dLucQCgrz1i\nQDjzjtxa/ZH8ibtkLnEJNvQ=\n=7iZK\n-----END PGP SIGNATURE-----\n. iDefense Security Advisory 03.18.08\nhttp://labs.idefense.com/intelligence/vulnerabilities/\nMar 18, 2008\n\nI. BACKGROUND\n\nThe Common UNIX Printing System, more commonly referred to as CUPS,\nprovides a standard printer interface for various Unix based operating\nsystems. For more information, visit the vendor\u0027s website at the\nfollowing URL. \n\nhttp://www.cups.org/\n\nII. \n\nCUPS listens on TCP port 631 for requests. This interface provides\naccess to several CGI applications used to administer CUPS and provide\ninformation about print jobs. By passing a specially crafted request,\nan attacker can trigger a heap based buffer overflow. \n\nIII. Depending on the\nunderlying operating system and distribution, CUPS may run as the lp,\ndaemon, or a different user. \n\nIn order to exploit this vulnerability remotely, the targeted host must\nbe sharing a printer(s) on the network. If a printer is not being\nshared, where CUPS only listens on the local interface, this\nvulnerability could only be used to elevate privileges locally. \n\nIV. \n\nV. WORKAROUND\n\nDisabling printer sharing will prevent this vulnerability from being\nexploited remotely. However, local users will still be able to obtain\nthe privileges of the CUPS service user. \n\nVI. VENDOR RESPONSE\n\nApple Inc. has addressed this vulnerability within Security Update\n2008-002. For more information, visit the following URL. \n\nhttp://docs.info.apple.com/article.html?artnum=307562\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nname CVE-2008-0047 to this issue. This is a candidate for inclusion in\nthe CVE list (http://cve.mitre.org/), which standardizes names for\nsecurity problems. \n\nVIII. DISCLOSURE TIMELINE\n\n02/26/2008 Initial vendor notification\n02/26/2008 Initial vendor response\n03/18/2008 Coordinated public disclosure\n\nIX. CREDIT\n\nThis vulnerability was reported to iDefense by regenrecht. \n\nGet paid for vulnerability research\nhttp://labs.idefense.com/methodology/vulnerability/vcp.php\n\nFree tools, research and upcoming events\nhttp://labs.idefense.com/\n\nX. LEGAL NOTICES\n\nCopyright \\xa9 2008 iDefense, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDefense. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically,\nplease e-mail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \n There are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct,\nindirect, or consequential loss or damage arising from use of, or\nreliance on, this information. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 200804-01\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: CUPS: Multiple vulnerabilities\n Date: April 01, 2008\n Bugs: #211449, #212364, #214068\n ID: 200804-01\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been discovered in CUPS, allowing for the\nremote execution of arbitrary code and a Denial of Service. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-print/cups \u003c 1.2.12-r7 \u003e= 1.2.12-r7\n\nDescription\n===========\n\nMultiple vulnerabilities have been reported in CUPS:\n\n* regenrecht (VeriSign iDefense) discovered that the\n cgiCompileSearch() function used in several CGI scripts in CUPS\u0027\n administration interface does not correctly calculate boundaries when\n processing a user-provided regular expression, leading to a\n heap-based buffer overflow (CVE-2008-0047). \n\n* Tomas Hoger (Red Hat) reported that the gif_read_lzw() function\n uses the code_size value from GIF images without properly checking\n it, leading to a buffer overflow (CVE-2008-1373). \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll CUPS users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-print/cups-1.2.12-r7\"\n\nReferences\n==========\n\n [ 1 ] CVE-2008-0047\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0047\n [ 2 ] CVE-2008-0053\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0053\n [ 3 ] CVE-2008-0882\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0882\n [ 4 ] CVE-2008-1373\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1373\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200804-01.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. \n\nLicense\n=======\n\nCopyright 2008 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2008-0047" }, { "db": "JVNDB", "id": "JVNDB-2008-001226" }, { "db": "BID", "id": "28307" }, { "db": "BID", "id": "28304" }, { "db": "VULHUB", "id": "VHN-30172" }, { "db": "PACKETSTORM", "id": "64876" }, { "db": "PACKETSTORM", "id": "65138" }, { "db": "PACKETSTORM", "id": "65135" }, { "db": "PACKETSTORM", "id": "64696" }, { "db": "PACKETSTORM", "id": "65091" } ], "trust": 2.7 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-30172", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-30172" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-0047", "trust": 3.3 }, { "db": "USCERT", "id": "TA08-079A", "trust": 2.5 }, { "db": "SECUNIA", "id": "29420", "trust": 2.5 }, { "db": "BID", "id": "28307", "trust": 2.2 }, { "db": "SECTRACK", "id": "1019646", "trust": 1.9 }, { "db": "SECUNIA", "id": "29431", "trust": 1.9 }, { "db": "VUPEN", "id": "ADV-2008-0924", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2008-0921", "trust": 1.1 }, { "db": "SECUNIA", "id": "29655", "trust": 1.1 }, { "db": "SECUNIA", "id": "29448", "trust": 1.1 }, { "db": "SECUNIA", "id": "29573", "trust": 1.1 }, { "db": "SECUNIA", "id": "29603", "trust": 1.1 }, { "db": "SECUNIA", "id": "29634", "trust": 1.1 }, { "db": "SECUNIA", "id": "29750", "trust": 1.1 }, { "db": "SECUNIA", "id": "29485", "trust": 1.1 }, { "db": "BID", "id": "28304", "trust": 0.9 }, { "db": "USCERT", "id": "SA08-079A", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2008-001226", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200803-275", "trust": 0.7 }, { "db": "CERT/CC", "id": "TA08-079A", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2008-03-18", "trust": 0.6 }, { "db": "BID", "id": "28359", "trust": 0.6 }, { "db": "SECTRACK", "id": "1019650", "trust": 0.6 }, { "db": "XF", "id": "41297", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "64696", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "65091", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "64876", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-30172", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "65138", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "65135", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-30172" }, { "db": "BID", "id": "28307" }, { "db": "BID", "id": "28304" }, { "db": "JVNDB", "id": "JVNDB-2008-001226" }, { "db": "PACKETSTORM", "id": "64876" }, { "db": "PACKETSTORM", "id": "65138" }, { "db": "PACKETSTORM", "id": "65135" }, { "db": "PACKETSTORM", "id": "64696" }, { "db": "PACKETSTORM", "id": "65091" }, { "db": "CNNVD", "id": "CNNVD-200803-275" }, { "db": "NVD", "id": "CVE-2008-0047" } ] }, "id": "VAR-200803-0013", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-30172" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T19:27:47.167000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Security Update 2008-002", "trust": 0.8, "url": "http://support.apple.com/kb/ht1249?viewlocale=en_us" }, { "title": "Security Update 2008-002", "trust": 0.8, "url": "http://support.apple.com/kb/ht1249?viewlocale=ja_jp" }, { "title": "cups-1.2.4-11.14.6.1AX", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=127" }, { "title": "STR #2729", "trust": 0.8, "url": "http://www.cups.org/str.php?l2729" }, { "title": "RHSA-2008:0192", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2008-0192.html" }, { "title": "TLSA-2008-19", "trust": 0.8, "url": "http://www.turbolinux.com/security/2008/tlsa-2008-19.txt" }, { "title": "TLSA-2008-19", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2008/tlsa-2008-19j.txt" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001226" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-30172" }, { "db": "JVNDB", "id": "JVNDB-2008-001226" }, { "db": "NVD", "id": "CVE-2008-0047" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.us-cert.gov/cas/techalerts/ta08-079a.html" }, { "trust": 2.5, "url": "http://secunia.com/advisories/29420" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/28307" }, { "trust": 1.9, "url": "http://www.securitytracker.com/id?1019646" }, { "trust": 1.9, "url": "http://secunia.com/advisories/29431" }, { "trust": 1.8, "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2008/mar/msg00001.html" }, { "trust": 1.4, "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674" }, { "trust": 1.2, "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "trust": 1.1, "url": "http://www.debian.org/security/2008/dsa-1530" }, { "trust": 1.1, "url": "https://www.redhat.com/archives/fedora-package-announce/2008-april/msg00091.html" }, { "trust": 1.1, "url": "https://www.redhat.com/archives/fedora-package-announce/2008-april/msg00105.html" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:081" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10085" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2008-0192.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/29448" }, { "trust": 1.1, "url": "http://secunia.com/advisories/29485" }, { "trust": 1.1, "url": "http://secunia.com/advisories/29573" }, { "trust": 1.1, "url": "http://secunia.com/advisories/29603" }, { "trust": 1.1, "url": "http://secunia.com/advisories/29634" }, { "trust": 1.1, "url": "http://secunia.com/advisories/29655" }, { "trust": 1.1, "url": "http://secunia.com/advisories/29750" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00005.html" }, { "trust": 1.1, "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/0921/references" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "trust": 1.0, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0047" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2008/0921" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2008/0924" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnta08-079a/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/trta08-079a/index.html" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0047" }, { "trust": 0.8, "url": "http://www.us-cert.gov/cas/alerts/sa08-079a.html" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/41297" }, { "trust": 0.6, "url": "http://www.securitytracker.com/id?1019650" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/28359" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/28304" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2008/0924/references" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0047" }, { "trust": 0.3, "url": "http://www.cups.org" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0192.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2008-0206.html" }, { "trust": 0.3, "url": "http://www.apple.com/macosx/" }, { "trust": 0.3, "url": "http://docs.info.apple.com/article.html?artnum=307430" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0882" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-1373" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0053" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1373" }, { "trust": 0.2, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0053" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-common_1.2.7-4etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_amd64.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-bsd_1.2.7-4etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2_1.2.7-4etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-dev_1.2.7-4etch3_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2-gnutls10_1.2.7-4etch3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys_1.2.7-4etch3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsimage2-dev_1.2.7-4etch3_mips.deb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/libcupsys2_1.2.7-4etch3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-dbg_1.2.7-4etch3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/c/cupsys/cupsys-client_1.2.7-4etch3_s390.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.3.2-1ubuntu7.6_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.4-2ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.4-2ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.8-0ubuntu8.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.8-0ubuntu8.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.8-0ubuntu8.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.8-0ubuntu8.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.4-2ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.4-2ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.8-0ubuntu8.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.4-2ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.4-2ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.4-2ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.4-2ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.3.2-1ubuntu7.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.4-2ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.8-0ubuntu8.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.8-0ubuntu8.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.8-0ubuntu8.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.4-2ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-gnutls10_1.2.2-0ubuntu0.6.06.8_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.4-2ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.2.8-0ubuntu8.3_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.8-0ubuntu8.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.4-2ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.4-2ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.4-2ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.8-0ubuntu8.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.4-2ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.8-0ubuntu8.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.8-0ubuntu8.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.8-0ubuntu8.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.8-0ubuntu8.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.8-0ubuntu8.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.4-2ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.4-2ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2-0ubuntu0.6.06.8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.4-2ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.2-0ubuntu0.6.06.8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.4-2ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.6_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.8-0ubuntu8.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.4-2ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.3.2-1ubuntu7.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.3.2-1ubuntu7.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.8-0ubuntu8.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.4-2ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.8-0ubuntu8.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.8-0ubuntu8.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.8-0ubuntu8.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.6_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2-1ubuntu7.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.8-0ubuntu8.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.4-2ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.3.2-1ubuntu7.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2-dev_1.2.2-0ubuntu0.6.06.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.3.2.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.3.2-1ubuntu7.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2-dev_1.2.2-0ubuntu0.6.06.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.4-2ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.8-0ubuntu8.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.6_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.4-2ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.2-0ubuntu0.6.06.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.8-0ubuntu8.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-client_1.2.2-0ubuntu0.6.06.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-common_1.2.4-2ubuntu3.3_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.3.2-1ubuntu7.6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys-bsd_1.2.4-2ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.2.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/cupsys_1.2.8-0ubuntu8.3.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsys2_1.2.2-0ubuntu0.6.06.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/c/cupsys/libcupsimage2_1.2.8-0ubuntu8.3_sparc.deb" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://cve.mitre.org/)," }, { "trust": 0.1, "url": "http://www.cups.org/" }, { "trust": 0.1, "url": "http://labs.idefense.com/intelligence/vulnerabilities/" }, { "trust": 0.1, "url": "http://labs.idefense.com/methodology/vulnerability/vcp.php" }, { "trust": 0.1, "url": "http://labs.idefense.com/" }, { "trust": 0.1, "url": "http://bugs.gentoo.org." }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0882" } ], "sources": [ { "db": "VULHUB", "id": "VHN-30172" }, { "db": "BID", "id": "28307" }, { "db": "BID", "id": "28304" }, { "db": "JVNDB", "id": "JVNDB-2008-001226" }, { "db": "PACKETSTORM", "id": "64876" }, { "db": "PACKETSTORM", "id": "65138" }, { "db": "PACKETSTORM", "id": "65135" }, { "db": "PACKETSTORM", "id": "64696" }, { "db": "PACKETSTORM", "id": "65091" }, { "db": "CNNVD", "id": "CNNVD-200803-275" }, { "db": "NVD", "id": "CVE-2008-0047" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-30172" }, { "db": "BID", "id": "28307" }, { "db": "BID", "id": "28304" }, { "db": "JVNDB", "id": "JVNDB-2008-001226" }, { "db": "PACKETSTORM", "id": "64876" }, { "db": "PACKETSTORM", "id": "65138" }, { "db": "PACKETSTORM", "id": "65135" }, { "db": "PACKETSTORM", "id": "64696" }, { "db": "PACKETSTORM", "id": "65091" }, { "db": "CNNVD", "id": "CNNVD-200803-275" }, { "db": "NVD", "id": "CVE-2008-0047" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2008-03-18T00:00:00", "db": "VULHUB", "id": "VHN-30172" }, { "date": "2008-03-18T00:00:00", "db": "BID", "id": "28307" }, { "date": "2008-03-18T00:00:00", "db": "BID", "id": "28304" }, { "date": "2008-04-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001226" }, { "date": "2008-03-26T00:21:40", "db": "PACKETSTORM", "id": "64876" }, { "date": "2008-04-03T05:47:02", "db": "PACKETSTORM", "id": "65138" }, { "date": "2008-04-03T05:41:48", "db": "PACKETSTORM", "id": "65135" }, { "date": "2008-03-19T02:41:26", "db": "PACKETSTORM", "id": "64696" }, { "date": "2008-04-02T02:36:51", "db": "PACKETSTORM", "id": "65091" }, { "date": "2008-03-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200803-275" }, { "date": "2008-03-18T23:44:00", "db": "NVD", "id": "CVE-2008-0047" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-29T00:00:00", "db": "VULHUB", "id": "VHN-30172" }, { "date": "2015-04-13T21:32:00", "db": "BID", "id": "28307" }, { "date": "2008-03-22T01:10:00", "db": "BID", "id": "28304" }, { "date": "2008-07-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001226" }, { "date": "2008-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-200803-275" }, { "date": "2017-09-29T01:30:05.377000", "db": "NVD", "id": "CVE-2008-0047" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "65135" }, { "db": "PACKETSTORM", "id": "64696" }, { "db": "PACKETSTORM", "id": "65091" }, { "db": "CNNVD", "id": "CNNVD-200803-275" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CUPS of cgiCompileSearch() Heap-based buffer overflow vulnerability in functions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2008-001226" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-200803-275" } ], "trust": 0.6 } }
rhsa-2008_0192
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated cups packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Common UNIX Printing System (CUPS) provides a portable printing layer\nfor UNIX(R) operating systems.\n\nA heap buffer overflow flaw was found in a CUPS administration interface\nCGI script. A local attacker able to connect to the IPP port (TCP port 631)\ncould send a malicious request causing the script to crash or, potentially,\nexecute arbitrary code as the \"lp\" user. Please note: the default CUPS\nconfiguration in Red Hat Enterprise Linux 5 does not allow remote\nconnections to the IPP TCP port. (CVE-2008-0047)\n\nRed Hat would like to thank \"regenrecht\" for reporting this issue.\n\nThis issue did not affect the versions of CUPS as shipped with Red Hat\nEnterprise Linux 3 or 4.\n\nTwo overflows were discovered in the HP-GL/2-to-PostScript filter. An\nattacker could create a malicious HP-GL/2 file that could possibly execute\narbitrary code as the \"lp\" user if the file is printed. (CVE-2008-0053)\n\nA buffer overflow flaw was discovered in the GIF decoding routines used by\nCUPS image converting filters \"imagetops\" and \"imagetoraster\". An attacker\ncould create a malicious GIF file that could possibly execute arbitrary\ncode as the \"lp\" user if the file was printed. (CVE-2008-1373)\n\nAll cups users are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0192", "url": "https://access.redhat.com/errata/RHSA-2008:0192" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "436153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436153" }, { "category": "external", "summary": "438117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438117" }, { "category": "external", "summary": "438303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438303" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0192.json" } ], "title": "Red Hat Security Advisory: cups security update", "tracking": { "current_release_date": "2024-11-22T01:53:11+00:00", "generator": { "date": "2024-11-22T01:53:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0192", "initial_release_date": "2008-04-01T14:10:00+00:00", "revision_history": [ { "date": "2008-04-01T14:10:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-04-01T10:10:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:53:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.2.4-11.14.el5_1.6.src", "product": { "name": "cups-1:1.2.4-11.14.el5_1.6.src", "product_id": "cups-1:1.2.4-11.14.el5_1.6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.2.4-11.14.el5_1.6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.2.4-11.14.el5_1.6.x86_64", "product": { "name": "cups-1:1.2.4-11.14.el5_1.6.x86_64", "product_id": "cups-1:1.2.4-11.14.el5_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.2.4-11.14.el5_1.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "product": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "product_id": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.14.el5_1.6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.i386", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.i386", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.i386", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.i386", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-1:1.2.4-11.14.el5_1.6.i386", "product": { "name": "cups-1:1.2.4-11.14.el5_1.6.i386", "product_id": "cups-1:1.2.4-11.14.el5_1.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.2.4-11.14.el5_1.6?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "product": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "product_id": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.14.el5_1.6?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.2.4-11.14.el5_1.6.ia64", "product": { "name": "cups-1:1.2.4-11.14.el5_1.6.ia64", "product_id": "cups-1:1.2.4-11.14.el5_1.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.2.4-11.14.el5_1.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "product": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "product_id": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.14.el5_1.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=ia64\u0026epoch=1" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.2.4-11.14.el5_1.6.ppc", "product": { "name": "cups-1:1.2.4-11.14.el5_1.6.ppc", "product_id": "cups-1:1.2.4-11.14.el5_1.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.2.4-11.14.el5_1.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "product": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "product_id": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.14.el5_1.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "cups-1:1.2.4-11.14.el5_1.6.s390x", "product": { "name": "cups-1:1.2.4-11.14.el5_1.6.s390x", "product_id": "cups-1:1.2.4-11.14.el5_1.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups@1.2.4-11.14.el5_1.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "product": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "product_id": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-lpd@1.2.4-11.14.el5_1.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390", "product": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390", "product_id": "cups-libs-1:1.2.4-11.14.el5_1.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-libs@1.2.4-11.14.el5_1.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390", "product": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390", "product_id": "cups-devel-1:1.2.4-11.14.el5_1.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-devel@1.2.4-11.14.el5_1.6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "product": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "product_id": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/cups-debuginfo@1.2.4-11.14.el5_1.6?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.2.4-11.14.el5_1.6.src" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.2.4-11.14.el5_1.6.src" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" }, "product_reference": "cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "regenrecht" ] } ], "cve": "CVE-2008-0047", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2008-02-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "436153" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: heap based buffer overflow in cgiCompileSearch()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0047" }, { "category": "external", "summary": "RHBZ#436153", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=436153" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0047", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0047" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0047", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0047" } ], "release_date": "2008-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-04-01T14:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0192" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cups: heap based buffer overflow in cgiCompileSearch()" }, { "cve": "CVE-2008-0053", "discovery_date": "2008-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "438117" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: buffer overflows in HP-GL/2 filter", "title": "Vulnerability summary" }, { "category": "other", "text": "NVD clarification:\n\nTo exploit this flaw an attacker needs to print a malicious file through the vulnerable filter (either themselves or by convincing a victim to do so), it should therefore be AC:M\n\nIn CUPS, print filters run as an unprivileged user no superuser (root), therefore this should be scored C:P, I:P, A:P", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0053" }, { "category": "external", "summary": "RHBZ#438117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0053", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0053" } ], "release_date": "2008-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-04-01T14:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0192" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cups: buffer overflows in HP-GL/2 filter" }, { "cve": "CVE-2008-1373", "discovery_date": "2008-03-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "438303" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.", "title": "Vulnerability description" }, { "category": "summary", "text": "cups: overflow in gif image filter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-1373" }, { "category": "external", "summary": "RHBZ#438303", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438303" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-1373", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1373" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1373", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1373" } ], "release_date": "2008-04-01T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-04-01T14:10:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0192" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.src", "5Client-Workstation:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client-Workstation:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-1:1.2.4-11.14.el5_1.6.src", "5Client:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Client:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-1:1.2.4-11.14.el5_1.6.src", "5Server:cups-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-debuginfo-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-devel-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.ppc64", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-libs-1:1.2.4-11.14.el5_1.6.x86_64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.i386", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ia64", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.ppc", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.s390x", "5Server:cups-lpd-1:1.2.4-11.14.el5_1.6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "cups: overflow in gif image filter" } ] }
ghsa-955r-8v94-5rcf
Vulnerability from github
Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.
{ "affected": [], "aliases": [ "CVE-2008-0047" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-03-18T23:44:00Z", "severity": "HIGH" }, "details": "Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.", "id": "GHSA-955r-8v94-5rcf", "modified": "2022-05-01T23:27:20Z", "published": "2022-05-01T23:27:20Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0047" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10085" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00091.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" }, { "type": "WEB", "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "type": "WEB", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00005.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/29420" }, { "type": "WEB", "url": "http://secunia.com/advisories/29431" }, { "type": "WEB", "url": "http://secunia.com/advisories/29448" }, { "type": "WEB", "url": "http://secunia.com/advisories/29485" }, { "type": "WEB", "url": "http://secunia.com/advisories/29573" }, { "type": "WEB", "url": "http://secunia.com/advisories/29603" }, { "type": "WEB", "url": "http://secunia.com/advisories/29634" }, { "type": "WEB", "url": "http://secunia.com/advisories/29655" }, { "type": "WEB", "url": "http://secunia.com/advisories/29750" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "type": "WEB", "url": "http://www.debian.org/security/2008/dsa-1530" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/28307" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1019646" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/0921/references" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2008/0924/references" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2008-0047
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2008-0047", "description": "Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.", "id": "GSD-2008-0047", "references": [ "https://www.suse.com/security/cve/CVE-2008-0047.html", "https://www.debian.org/security/2008/dsa-1530", "https://access.redhat.com/errata/RHSA-2008:0192", "https://linux.oracle.com/cve/CVE-2008-0047.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2008-0047" ], "details": "Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions.", "id": "GSD-2008-0047", "modified": "2023-12-13T01:22:59.121380Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29485", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29485" }, { "name": "SUSE-SA:2008:015", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00005.html" }, { "name": "29573", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29573" }, { "name": "ADV-2008-0921", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0921/references" }, { "name": "TA08-079A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "name": "1019646", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019646" }, { "name": "ADV-2008-0924", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "FEDORA-2008-2131", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00091.html" }, { "name": "USN-598-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "name": "MDVSA-2008:081", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "name": "29420", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29420" }, { "name": "APPLE-SA-2008-03-18", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "28307", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28307" }, { "name": "oval:org.mitre.oval:def:10085", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10085" }, { "name": "29750", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29750" }, { "name": "29448", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29448" }, { "name": "FEDORA-2008-2897", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" }, { "name": "29634", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29634" }, { "name": "29655", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29655" }, { "name": "http://docs.info.apple.com/article.html?artnum=307562", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "name": "29431", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29431" }, { "name": "20080318 Multiple Vendor CUPS CGI Heap Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674" }, { "name": "DSA-1530", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1530" }, { "name": "RHSA-2008:0192", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "name": "GLSA-200804-01", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "name": "29603", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29603" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cups:cups:1.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0047" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Heap-based buffer overflow in the cgiCompileSearch function in CUPS 1.3.5, and other versions including the version bundled with Apple Mac OS X 10.5.2, when printer sharing is enabled, allows remote attackers to execute arbitrary code via crafted search expressions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2008-03-18", "refsource": "APPLE", "tags": [ "Patch" ], "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html" }, { "name": "20080318 Multiple Vendor CUPS CGI Heap Overflow Vulnerability", "refsource": "IDEFENSE", "tags": [], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674" }, { "name": "http://docs.info.apple.com/article.html?artnum=307562", "refsource": "CONFIRM", "tags": [], "url": "http://docs.info.apple.com/article.html?artnum=307562" }, { "name": "SUSE-SA:2008:015", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00005.html" }, { "name": "28307", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/28307" }, { "name": "1019646", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1019646" }, { "name": "29431", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29431" }, { "name": "29448", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29448" }, { "name": "DSA-1530", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2008/dsa-1530" }, { "name": "TA08-079A", "refsource": "CERT", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA08-079A.html" }, { "name": "29420", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29420" }, { "name": "29485", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29485" }, { "name": "GLSA-200804-01", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200804-01.xml" }, { "name": "RHSA-2008:0192", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0192.html" }, { "name": "29634", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29634" }, { "name": "MDVSA-2008:081", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:081" }, { "name": "USN-598-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-598-1" }, { "name": "29573", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29573" }, { "name": "29603", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29603" }, { "name": "29655", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29655" }, { "name": "FEDORA-2008-2131", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00091.html" }, { "name": "FEDORA-2008-2897", "refsource": "FEDORA", "tags": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html" }, { "name": "29750", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29750" }, { "name": "ADV-2008-0924", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0924/references" }, { "name": "ADV-2008-0921", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0921/references" }, { "name": "oval:org.mitre.oval:def:10085", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10085" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2017-09-29T01:30Z", "publishedDate": "2008-03-18T23:44Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.