SB2014061602 - Gentoo update for cups-filters
Published: June 16, 2014 Updated: September 25, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2013-6473)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple heap-based buffer overflows in the urftopdf filter in cups-filters 1.0.25 before 1.0.47 allow remote attackers to execute arbitrary code via a large (1) page or (2) line in a URF file.
2) Heap-based buffer overflow (CVE-ID: CVE-2013-6474)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Heap-based buffer overflow in the pdftoopvp filter in CUPS and cups-filters before 1.0.47. A remote attacker can use a crafted PDF file. to trigger heap-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Input validation error (CVE-ID: CVE-2013-6475)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.
4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2013-6476)
The vulnerability allows a local non-authenticated attacker to read and manipulate data.
The OPVPWrapper::loadDriver function in oprs/OPVPWrapper.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows local users to gain privileges via a Trojan horse driver in the same directory as the PDF file.
5) OS Command Injection (CVE-ID: CVE-2014-2707)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
cups-browsed in cups-filters 1.0.41 before 1.0.51 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the (1) model or (2) PDL, related to "System V interface scripts generated for queues."
Remediation
Install update from vendor's website.