rpm package
opensuse/cups&distro=openSUSE Tumbleweed
pkg:rpm/opensuse/cups&distro=openSUSE%20Tumbleweed
Vulnerabilities (54)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-8842 | — | < 2.3.3op2-4.2 | 2.3.3op2-4.2 | Oct 27, 2020 | A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs. | ||
| CVE-2019-8696 | — | < 2.3.3op2-4.2 | 2.3.3op2-4.2 | Oct 27, 2020 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code. | ||
| CVE-2020-3898 | — | < 2.3.3op2-4.2 | 2.3.3op2-4.2 | Oct 22, 2020 | A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. An application may be able to gain elevated privileges. | ||
| CVE-2012-6094 | — | < 2.1.3-2.3 | 2.1.3-2.3 | Dec 20, 2019 | cups (Common Unix Printing System) 'Listen localhost:631' option not honored correctly which could provide unauthorized access to the system | ||
| CVE-2019-2228 | — | < 2.3.3op2-4.2 | 2.3.3op2-4.2 | Dec 6, 2019 | In array_find of array.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure in the printer spooler with no additional execution privileges needed. User interaction is not needed for exploitation.Product: Andro | ||
| CVE-2017-18248 | — | < 2.3.3op2-4.2 | 2.3.3op2-4.2 | Mar 26, 2018 | The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification. | ||
| CVE-2015-1159 | — | < 2.1.3-2.3 | 2.1.3-2.3 | Jun 26, 2015 | Cross-site scripting (XSS) vulnerability in the cgi_puts function in cgi-bin/template.c in the template engine in CUPS before 2.0.3 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter to help/. | ||
| CVE-2015-1158 | — | < 2.1.3-2.3 | 2.1.3-2.3 | Jun 26, 2015 | The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JO | ||
| CVE-2014-5031 | — | < 2.1.3-2.3 | 2.1.3-2.3 | Jul 29, 2014 | The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors. | ||
| CVE-2014-5030 | — | < 2.1.3-2.3 | 2.1.3-2.3 | Jul 29, 2014 | CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py. | ||
| CVE-2014-5029 | — | < 2.1.3-2.3 | 2.1.3-2.3 | Jul 29, 2014 | The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537. | ||
| CVE-2014-3537 | — | < 2.1.3-2.3 | 2.1.3-2.3 | Jul 23, 2014 | The web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/. | ||
| CVE-2014-2856 | — | < 2.1.3-2.3 | 2.1.3-2.3 | Apr 18, 2014 | Cross-site scripting (XSS) vulnerability in scheduler/client.c in Common Unix Printing System (CUPS) before 1.7.2 allows remote attackers to inject arbitrary web script or HTML via the URL path, related to the is_path_absolute function. | ||
| CVE-2012-5519 | — | < 2.1.3-2.3 | 2.1.3-2.3 | Nov 20, 2012 | CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging th | ||
| CVE-2010-2941 | Cri | 9.8 | < 2.1.3-2.3 | 2.1.3-2.3 | Nov 5, 2010 | ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP r | |
| CVE-2010-0542 | — | < 2.1.3-2.3 | 2.1.3-2.3 | Jun 21, 2010 | The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possi | ||
| CVE-2010-1748 | — | < 2.1.3-2.3 | 2.1.3-2.3 | Jun 17, 2010 | The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent h | ||
| CVE-2010-0540 | — | < 2.1.3-2.3 | 2.1.3-2.3 | Jun 17, 2010 | Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, allows remote attackers to hijack the authentication of administrators for requests that change settings. | ||
| CVE-2010-0393 | — | < 2.1.3-2.3 | 2.1.3-2.3 | Mar 5, 2010 | The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable to determine the file that provides localized message strings, which allows local users to gain privileges via a file that contains crafted local | ||
| CVE-2009-3553 | Hig | 7.5 | < 2.1.3-2.3 | 2.1.3-2.3 | Nov 20, 2009 | Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconne |
- CVE-2019-8842Oct 27, 2020affected < 2.3.3op2-4.2fixed 2.3.3op2-4.2
A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs.
- CVE-2019-8696Oct 27, 2020affected < 2.3.3op2-4.2fixed 2.3.3op2-4.2
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra. An attacker in a privileged network position may be able to execute arbitrary code.
- CVE-2020-3898Oct 22, 2020affected < 2.3.3op2-4.2fixed 2.3.3op2-4.2
A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15.4. An application may be able to gain elevated privileges.
- CVE-2012-6094Dec 20, 2019affected < 2.1.3-2.3fixed 2.1.3-2.3
cups (Common Unix Printing System) 'Listen localhost:631' option not honored correctly which could provide unauthorized access to the system
- CVE-2019-2228Dec 6, 2019affected < 2.3.3op2-4.2fixed 2.3.3op2-4.2
In array_find of array.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure in the printer spooler with no additional execution privileges needed. User interaction is not needed for exploitation.Product: Andro
- CVE-2017-18248Mar 26, 2018affected < 2.3.3op2-4.2fixed 2.3.3op2-4.2
The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.
- CVE-2015-1159Jun 26, 2015affected < 2.1.3-2.3fixed 2.1.3-2.3
Cross-site scripting (XSS) vulnerability in the cgi_puts function in cgi-bin/template.c in the template engine in CUPS before 2.0.3 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter to help/.
- CVE-2015-1158Jun 26, 2015affected < 2.1.3-2.3fixed 2.1.3-2.3
The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JO
- CVE-2014-5031Jul 29, 2014affected < 2.1.3-2.3fixed 2.1.3-2.3
The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.
- CVE-2014-5030Jul 29, 2014affected < 2.1.3-2.3fixed 2.1.3-2.3
CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.
- CVE-2014-5029Jul 29, 2014affected < 2.1.3-2.3fixed 2.1.3-2.3
The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537.
- CVE-2014-3537Jul 23, 2014affected < 2.1.3-2.3fixed 2.1.3-2.3
The web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/.
- CVE-2014-2856Apr 18, 2014affected < 2.1.3-2.3fixed 2.1.3-2.3
Cross-site scripting (XSS) vulnerability in scheduler/client.c in Common Unix Printing System (CUPS) before 1.7.2 allows remote attackers to inject arbitrary web script or HTML via the URL path, related to the is_path_absolute function.
- CVE-2012-5519Nov 20, 2012affected < 2.1.3-2.3fixed 2.1.3-2.3
CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging th
- affected < 2.1.3-2.3fixed 2.1.3-2.3
ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP r
- CVE-2010-0542Jun 21, 2010affected < 2.1.3-2.3fixed 2.1.3-2.3
The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possi
- CVE-2010-1748Jun 17, 2010affected < 2.1.3-2.3fixed 2.1.3-2.3
The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent h
- CVE-2010-0540Jun 17, 2010affected < 2.1.3-2.3fixed 2.1.3-2.3
Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, allows remote attackers to hijack the authentication of administrators for requests that change settings.
- CVE-2010-0393Mar 5, 2010affected < 2.1.3-2.3fixed 2.1.3-2.3
The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable to determine the file that provides localized message strings, which allows local users to gain privileges via a file that contains crafted local
- affected < 2.1.3-2.3fixed 2.1.3-2.3
Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconne
Page 2 of 3