First published: Thu Nov 07 2013(Updated: )
A heap-based buffer overflow flaw was found in the pdftoopvp filter. If a malicious PDF file were processed, it could lead to arbitrary code execution with the privileges of the "lp" user. This issue was due to the following fix not being present in pdftoopvp: <a href="https://bugs.freedesktop.org/show_bug.cgi?id=17326">https://bugs.freedesktop.org/show_bug.cgi?id=17326</a> <a href="http://lists.freedesktop.org/archives/poppler/2008-August/004021.html">http://lists.freedesktop.org/archives/poppler/2008-August/004021.html</a> Acknowledgements: This issue was discovered by Florian Weimer of the Red Hat Product Security Team.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/cups | 2.3.3op2-3+deb11u6 2.3.3op2-3+deb11u2 2.4.2-3+deb12u5 2.4.10-1 | |
debian/cups-filters | 1.28.7-1+deb11u2 1.28.17-3 1.28.17-4.1 | |
CUPS Filters | <=1.0.46 | |
CUPS Filters | =1.0 | |
CUPS Filters | =1.0.1 | |
CUPS Filters | =1.0.2 | |
CUPS Filters | =1.0.3 | |
CUPS Filters | =1.0.4 | |
CUPS Filters | =1.0.5 | |
CUPS Filters | =1.0.6 | |
CUPS Filters | =1.0.7 | |
CUPS Filters | =1.0.8 | |
CUPS Filters | =1.0.9 | |
CUPS Filters | =1.0.10 | |
CUPS Filters | =1.0.11 | |
CUPS Filters | =1.0.12 | |
CUPS Filters | =1.0.13 | |
CUPS Filters | =1.0.14 | |
CUPS Filters | =1.0.15 | |
CUPS Filters | =1.0.16 | |
CUPS Filters | =1.0.17 | |
CUPS Filters | =1.0.18 | |
CUPS Filters | =1.0.19 | |
CUPS Filters | =1.0.20 | |
CUPS Filters | =1.0.21 | |
CUPS Filters | =1.0.22 | |
CUPS Filters | =1.0.23 | |
CUPS Filters | =1.0.24 | |
CUPS Filters | =1.0.25 | |
CUPS Filters | =1.0.26 | |
CUPS Filters | =1.0.27 | |
CUPS Filters | =1.0.28 | |
CUPS Filters | =1.0.29 | |
CUPS Filters | =1.0.30 | |
CUPS Filters | =1.0.31 | |
CUPS Filters | =1.0.32 | |
CUPS Filters | =1.0.33 | |
CUPS Filters | =1.0.34 | |
CUPS Filters | =1.0.35 | |
CUPS Filters | =1.0.36 | |
CUPS Filters | =1.0.37 | |
CUPS Filters | =1.0.38 | |
CUPS Filters | =1.0.39 | |
CUPS Filters | =1.0.40 | |
CUPS Filters | =1.0.41 | |
CUPS Filters | =1.0.42 | |
CUPS Filters | =1.0.43 | |
CUPS Filters | =1.0.44 | |
CUPS Filters | =1.0.45 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Debian | ||
Fedora |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6474 is classified as a critical vulnerability due to its potential for arbitrary code execution.
To fix CVE-2013-6474, update the affected packages to the latest versions specified in the advisory.
CVE-2013-6474 affects multiple versions of the CUPS and CUPS-filters packages on various Linux distributions.
Yes, CVE-2013-6474 can be exploited remotely by processing a malicious PDF file.
No, CVE-2013-6474 specifically affects versions of CUPS and CUPS-filters prior to certain patched releases.