Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.100150
Kategorie:Denial of Service
Titel:CUPS < 1.3.10 Integer Overflow Vulnerability
Zusammenfassung:CUPS (Common UNIX Printing System) service is prone to an; integer overflow vulnerability.
Beschreibung:Summary:
CUPS (Common UNIX Printing System) service is prone to an
integer overflow vulnerability.

Vulnerability Impact:
Successful exploits may allow attackers to execute arbitrary code
with the privileges of a user running the utilities. Failed exploit attempts likely cause denial of
service conditions.

Affected Software/OS:
CUPS prior to version 1.3.10.

Solution:
Update to version 1.3.10 or later.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-0163
BugTraq ID: 34571
http://www.securityfocus.com/bid/34571
Bugtraq: 20090417 rPSA-2009-0061-1 cups (Google Search)
http://www.securityfocus.com/archive/1/502750/100/0/threaded
Debian Security Information: DSA-1773 (Google Search)
http://www.debian.org/security/2009/dsa-1773
http://security.gentoo.org/glsa/glsa-200904-20.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11546
http://www.redhat.com/support/errata/RHSA-2009-0428.html
http://www.redhat.com/support/errata/RHSA-2009-0429.html
http://www.securitytracker.com/id?1022070
http://secunia.com/advisories/34481
http://secunia.com/advisories/34722
http://secunia.com/advisories/34747
http://secunia.com/advisories/34756
http://secunia.com/advisories/34852
SuSE Security Announcement: SUSE-SA:2009:024 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00011.html
http://www.ubuntu.com/usn/usn-760-1
CopyrightCopyright (C) 2009 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.