First published: Thu Feb 19 2015(Updated: )
Integer underflow in the cupsRasterReadPixels function in filter/raster.c in CUPS before 2.0.2 allows remote attackers to have unspecified impact via a malformed compressed raster file, which triggers a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS | <=2.0.1 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Fedora | =20 | |
Fedora | =21 | |
SUSE Linux | =13.1 | |
SUSE Linux | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9679 has a high severity due to potential buffer overflow vulnerabilities that may lead to denial of service or remote code execution.
To fix CVE-2014-9679, upgrade to CUPS version 2.0.2 or later, which addresses the integer underflow vulnerability.
CVE-2014-9679 affects CUPS versions prior to 2.0.2, specifically CUPS 2.0.1 and earlier.
CVE-2014-9679 can be exploited by remote attackers using malformed compressed raster files to execute arbitrary code.
No, systems running Ubuntu 12.04 or higher are not vulnerable to CVE-2014-9679, as they include patched versions of CUPS.