First published: Sat Dec 31 2005(Updated: )
Multiple stack-based buffer overflows in the phpcups PHP module for CUPS 1.1.23rc1 might allow context-dependent attackers to execute arbitrary code via vectors that result in long function parameters, as demonstrated by the cups_get_dest_options function in phpcups.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS libraries | =1.1.23-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4873 is classified as a high severity vulnerability due to the potential for arbitrary code execution.
Fix CVE-2005-4873 by upgrading to a patched version of the CUPS software that addresses the stack-based buffer overflow.
CVE-2005-4873 affects CUPS version 1.1.23rc1 and could impact any systems running this version.
CVE-2005-4873 enables context-dependent attackers to exploit buffer overflows to execute arbitrary code.
The exploitability of CVE-2005-4873 depends on the attacker's access level and the specific configurations of the affected system.