First published: Tue Mar 24 2020(Updated: )
A heap-based buffer overflow was discovered in in libcups's ppdFindOption() function in ppd-mark.c:430. The issue can be reproduced by loading a crafted ppd file and calling the ppdMarkDefaults() libcups API function.
Credit: Stephan Zeisberg (github.com/stze) Security Research Labs product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X | <10.15.4 | |
Apple macOS Catalina | <10.15.4 | 10.15.4 |
Apple Mojave | ||
Apple High Sierra | ||
IBM QRadar SIEM | <=7.5 - 7.5.0 UP8 IF01 | |
ubuntu/cups | <2.2.7-1ubuntu2.8 | 2.2.7-1ubuntu2.8 |
ubuntu/cups | <2.2.12-2ubuntu1.1 | 2.2.12-2ubuntu1.1 |
ubuntu/cups | <2.3.1-9ubuntu1.1 | 2.3.1-9ubuntu1.1 |
ubuntu/cups | <2.1.3-4ubuntu0.11 | 2.1.3-4ubuntu0.11 |
debian/cups | 2.3.3op2-3+deb11u6 2.3.3op2-3+deb11u2 2.4.2-3+deb12u5 2.4.10-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-3898 is a vulnerability in CUPS that allows for memory corruption due to improper validation.
CVE-2020-3898 affects users of Apple macOS Catalina (10.15.4), Mojave, and High Sierra.
The severity level of CVE-2020-3898 has not been provided in the information provided.
To fix CVE-2020-3898, update your macOS to the latest version provided by Apple.
You can find more information about CVE-2020-3898 on the Apple support website.