First published: Thu Dec 26 2002(Updated: )
filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS (Common UNIX Printing System) | =1.1.10 | |
CUPS (Common UNIX Printing System) | =1.1.7 | |
CUPS (Common UNIX Printing System) | =1.0.4_8 | |
CUPS (Common UNIX Printing System) | =1.1.13 | |
CUPS (Common UNIX Printing System) | =1.1.17 | |
CUPS (Common UNIX Printing System) | =1.1.4_3 | |
CUPS (Common UNIX Printing System) | =1.1.4 | |
CUPS (Common UNIX Printing System) | =1.1.4_5 | |
CUPS (Common UNIX Printing System) | =1.1.1 | |
CUPS (Common UNIX Printing System) | =1.0.4 | |
CUPS (Common UNIX Printing System) | =1.1.14 | |
CUPS (Common UNIX Printing System) | =1.1.4_2 | |
CUPS (Common UNIX Printing System) | =1.1.6 | |
Apple iOS and macOS | =10.2.2 | |
Apple iOS and macOS | =10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1371 is considered critical due to the potential for remote code execution.
To mitigate CVE-2002-1371, update CUPS to version 1.1.18 or later, which has addressed the vulnerability.
CVE-2002-1371 affects CUPS versions 1.0.4 to 1.1.17.
Yes, CVE-2002-1371 can be exploited remotely by attackers through modified GIF images.
CVE-2002-1371 can lead to arbitrary code execution on systems running vulnerable versions of CUPS.