CVE-2008-5286
Published: 1 December 2008
Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.
Priority
Status
Package | Release | Status |
---|---|---|
cups Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
gutsy |
Does not exist
|
|
hardy |
Does not exist
|
|
intrepid |
Released
(1.3.9-2ubuntu6.1)
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://www.cups.org/strfiles/2974/str2974.patch |
||
cupsys Launchpad, Ubuntu, Debian |
dapper |
Released
(1.2.2-0ubuntu0.6.06.12)
|
gutsy |
Released
(1.3.2-1ubuntu7.9)
|
|
hardy |
Released
(1.3.7-1ubuntu3.3)
|
|
intrepid |
Does not exist
|
|
upstream |
Needs triage
|