Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. | Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. |

Status: PUBLISHED
Assigner: AHA
Published:
Updated: 2025-02-13T17:13:43.730Z
Reserved: 2023-08-23T21:14:04.183Z
Link: CVE-2023-4504

No data.

Status : Modified
Published: 2023-09-21T23:15:12.293
Modified: 2025-02-13T18:15:45.830
Link: CVE-2023-4504
