First published: Thu Dec 26 2002(Updated: )
jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS (Common UNIX Printing System) | =1.1.10 | |
CUPS (Common UNIX Printing System) | =1.1.7 | |
CUPS (Common UNIX Printing System) | =1.0.4_8 | |
CUPS (Common UNIX Printing System) | =1.1.13 | |
CUPS (Common UNIX Printing System) | =1.1.17 | |
CUPS (Common UNIX Printing System) | =1.1.4_3 | |
CUPS (Common UNIX Printing System) | =1.1.4 | |
CUPS (Common UNIX Printing System) | =1.1.4_5 | |
CUPS (Common UNIX Printing System) | =1.1.1 | |
CUPS (Common UNIX Printing System) | =1.0.4 | |
CUPS (Common UNIX Printing System) | =1.1.14 | |
CUPS (Common UNIX Printing System) | =1.1.4_2 | |
CUPS (Common UNIX Printing System) | =1.1.6 | |
Apple iOS and macOS | =10.2.2 | |
Apple iOS and macOS | =10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1369 has a high severity rating due to its potential for remote code execution via buffer overflow.
To fix CVE-2002-1369, upgrade to CUPS version 1.1.18 or later where the vulnerability has been addressed.
CVE-2002-1369 affects CUPS versions 1.1.10 to 1.1.17 inclusive.
Yes, exploitation of CVE-2002-1369 can allow remote attackers to execute arbitrary code, potentially leading to system compromise.
Mitigation for CVE-2002-1369 involves upgrading to a secure version of CUPS as no patch for earlier versions is available.