First published: Wed Sep 20 2023(Updated: )
It was discovered that libppd incorrectly parsed certain Postscript objects. If a user or automated system were tricked into printing a specially crafted document, a remote attacker could use this issue to cause libppd to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libppd2 | <2:2.0~rc1-0ubuntu1.2 | 2:2.0~rc1-0ubuntu1.2 |
Ubuntu Linux | =23.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-4504.
The severity of this vulnerability is high.
This vulnerability allows a remote attacker to cause libppd to crash, resulting in a denial of service, or possibly execute arbitrary code.
The libppd version 2:2.0~rc1-0ubuntu1.2 is affected by this vulnerability.
To fix this vulnerability, update libppd to version 2:2.0~rc1-0ubuntu1.2 or later.