First published: Wed Jun 24 2015(Updated: )
A heap-based buffer overflow was discovered in the way the texttopdf utility of cups-filters processed print jobs with a specially crafted line size. An attacker being able to submit print jobs could exploit this flaw to crash texttopdf or, possibly, execute arbitrary code with the privileges of the 'lp' user. Acknowledgements: This issue was discovered by Petr Sklenar of Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Ubuntu | =15.04 | |
Debian | =7.1 | |
Debian | =8.0 | |
CUPS Filters | <=1.0.70 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3258 is considered to have a medium severity rating due to its potential to allow an attacker to execute arbitrary code.
To fix CVE-2015-3258, upgrade the cups-filters package to the latest version that is not vulnerable.
CVE-2015-3258 affects various versions of Ubuntu Linux and Debian, specifically versions 12.04, 14.04, 14.10, 15.04, and 7.1, 8.0 respectively.
An attacker can exploit CVE-2015-3258 by submitting specially crafted print jobs to crash the texttopdf utility or potentially execute code with elevated privileges.
The vulnerability in CVE-2015-3258 lies in the way the texttopdf utility processes print jobs in the cups-filters package.