First published: Tue Oct 14 2008(Updated: )
Heap-based buffer overflow in the read_rle16 function in imagetops in CUPS before 1.3.9 allows remote attackers to execute arbitrary code via an SGI image with malformed Run Length Encoded (RLE) data containing a small image and a large row count.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS | =1.1.20 | |
CUPS | =1.1.5-2 | |
CUPS | =1.1.14 | |
CUPS | =1.3-rc2 | |
CUPS | =1.1.6-1 | |
CUPS | =1.1.18 | |
CUPS | =1.1.12 | |
CUPS | =1.1.5-1 | |
CUPS | =1.3.3 | |
CUPS | =1.1.22 | |
CUPS | =1.2.0 | |
CUPS | =1.1.16 | |
CUPS | =1.3.1 | |
CUPS | =1.1.23-rc1 | |
CUPS | =1.1.20-rc1 | |
CUPS | =1.1.15 | |
CUPS | =1.1.17 | |
CUPS | =1.1.20-rc6 | |
CUPS | =1.2.4 | |
CUPS | =1.1.19-rc1 | |
CUPS | =1.3.2 | |
CUPS | =1.1.22-rc1 | |
CUPS | =1.1.7 | |
CUPS | =1.2-rc2 | |
CUPS | =1.1.6-2 | |
CUPS | =1.3-b1 | |
CUPS | =1.1.3 | |
CUPS | =1.2.3 | |
CUPS | =1.1.21 | |
CUPS | =1.2.9 | |
CUPS | =1.2.10 | |
CUPS | =1.1.4 | |
CUPS | =1.1.23 | |
CUPS | =1.2.6 | |
CUPS | =1.2-b1 | |
CUPS | =1.1.20-rc4 | |
CUPS | =1.1.19 | |
CUPS | =1.1 | |
CUPS | =1.3.4 | |
CUPS | =1.1.8 | |
CUPS | <=1.3.8 | |
CUPS | =1.1.5 | |
CUPS | =1.2.1 | |
CUPS | =1.2-rc3 | |
CUPS | =1.1.2 | |
CUPS | =1.1.13 | |
CUPS | =1.1.19-rc4 | |
CUPS | =1.1.9-1 | |
CUPS | =1.2.12 | |
CUPS | =1.1.21-rc2 | |
CUPS | =1.2-b2 | |
CUPS | =1.2.7 | |
CUPS | =1.1.6-3 | |
CUPS | =1.1.20-rc5 | |
CUPS | =1.1.9 | |
CUPS | =1.3.7 | |
CUPS | =1.1.19-rc5 | |
CUPS | =1.2-rc1 | |
CUPS | =1.1.1 | |
CUPS | =1.2.8 | |
CUPS | =1.2.2 | |
CUPS | =1.1.10 | |
CUPS | =1.2.11 | |
CUPS | =1.1.22-rc2 | |
CUPS | =1.1.21-rc1 | |
CUPS | =1.3-rc1 | |
CUPS | =1.1.11 | |
CUPS | =1.1.19-rc3 | |
CUPS | =1.1.6 | |
CUPS | =1.1.10-1 | |
CUPS | =1.3.0 | |
CUPS | =1.3.5 | |
CUPS | =1.3.6 | |
CUPS | =1.1.20-rc2 | |
CUPS | =1.1.20-rc3 | |
CUPS | =1.2.5 | |
CUPS | =1.1.19-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3639 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2008-3639, upgrade CUPS to version 1.3.9 or later, as it contains the necessary patches.
CVE-2008-3639 affects CUPS versions prior to 1.3.9 and several earlier versions including 1.1 and versions up to 1.3.8.
The vulnerability can be exploited through specially crafted SGI images with malformed Run Length Encoded data.
Any system running the affected versions of CUPS prior to 1.3.9 is at risk of CVE-2008-3639.