#VU33331 Heap-based buffer overflow in CUPS - CVE-2011-3170
Published: August 19, 2011 / Updated: August 3, 2020
CUPS
Apple Inc.
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which. A remote attacker can use a crafted stream to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://cups.org/str.php?L3914
- http://secunia.com/advisories/45796
- http://secunia.com/advisories/46024
- http://security.gentoo.org/glsa/glsa-201207-10.xml
- http://www.debian.org/security/2011/dsa-2354
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:146
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:147
- http://www.securityfocus.com/bid/49323
- http://www.securitytracker.com/id?1025980
- http://www.ubuntu.com/usn/USN-1207-1
- https://bugzilla.redhat.com/show_bug.cgi?id=727800
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69380