First published: Thu Mar 20 2008(Updated: )
Buffer overflow in the gif_read_lzw function in CUPS 1.3.6 allows remote attackers to have an unknown impact via a GIF file with a large code_size value, a similar issue to CVE-2006-4484.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cups | <1:1.1.22-0.rc1.9.20.2.el4_6.6 | 1:1.1.22-0.rc1.9.20.2.el4_6.6 |
redhat/cups | <1:1.2.4-11.14.el5_1.6 | 1:1.2.4-11.14.el5_1.6 |
redhat/1.3.6 | <4. | 4. |
CUPS (Common UNIX Printing System) | =1.3.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1373 has a high severity due to the potential for remote code execution caused by a buffer overflow in the CUPS GIF parsing code.
To fix CVE-2008-1373, update CUPS to version 1.1.22-0.rc1.9.20.2.el4_6.6 or 1.2.4-11.14.el5_1.6, or ensure that you are using a version later than 1.3.6.
CVE-2008-1373 affects CUPS version 1.3.6 and earlier versions on systems such as Red Hat Enterprise Linux.
Yes, CVE-2008-1373 can be exploited remotely by sending a specially crafted GIF file to the CUPS service.
CVE-2008-1373 is associated with the gif_read_lzw function in the GIF parsing code used by the CUPS printing system.