VYPR
Unrated severityNVD Advisory· Published Aug 19, 2011· Updated Apr 29, 2026

CVE-2011-3170

CVE-2011-3170

Description

The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896.

Affected products

93
  • Apple Inc./Cups93 versions
    cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*+ 92 more
    • cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*range: <=1.4.8
    • cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.4.3:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.4.4:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.4.5:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.4.6:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.4.7:*:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.4:b1:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.4:b2:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.4:b3:*:*:*:*:*:*
    • cpe:2.3:a:apple:cups:1.4:rc1:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

12

News mentions

0

No linked articles in our index yet.