Upstream information

CVE-2008-5286 at MITRE

Description

Integer overflow in the _cupsImageReadPNG function in CUPS 1.1.17 through 1.3.9 allows remote attackers to execute arbitrary code via a PNG image with a large height value, which bypasses a validation check and triggers a buffer overflow.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entry: 448631 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Novell Linux Desktop 9 for x86
Open Enterprise Server
  • cups >= 1.1.20-108.56
  • cups-client >= 1.1.20-108.56
  • cups-devel >= 1.1.20-108.56
  • cups-libs >= 1.1.20-108.56
core9.x86-64
core9.ppc
core9.x86
core9.s390
sles9-nld.x86-64
sles9-nlpos.x86
core9.s390x
core9.ia64
sles9-nld.x86
sles9-oes.x86
YOU Patch Nr: 12317
Novell Linux Desktop 9 for x86_64
  • cups >= 1.1.20-108.56
  • cups-client >= 1.1.20-108.56
  • cups-devel >= 1.1.20-108.56
  • cups-libs >= 1.1.20-108.56
  • cups-libs-32bit >= 9-200812030152
core9.x86-64
core9.ppc
core9.x86
core9.s390
sles9-nld.x86-64
sles9-nlpos.x86
core9.s390x
core9.ia64
sles9-nld.x86
sles9-oes.x86
YOU Patch Nr: 12317
openSUSE 11.0
  • cups-debuginfo >= 1.3.7-25.6
  • cups-debugsource >= 1.3.7-25.6
openSUSE 11.0
  • cups >= 1.3.7-25.6
  • cups-client >= 1.3.7-25.6
  • cups-devel >= 1.3.7-25.6
  • cups-libs >= 1.3.7-25.6
  • cups-libs-32bit >= 1.3.7-25.6
  • cups-libs-64bit >= 1.3.7-25.6