CVE-2008-0053

CVE information

Published

14 years ago

Last Modified

4 years ago

CVSSv2.0 Severity

High

Impact Analysis

Description

Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file..

CVSSv2.0 Score

Severity
High
Base Score
10/10
Exploit Score
10/10
Access Vector
Network
Access Complexity
Low
Authentication Required
None
Impact Score
10/10
Confidentiality Impact
Complete
Availability Impact
Complete
Integrity Impact
Complete

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
  Yes
- -

Get started for free to scan for vulnerabilities

Companies of all sizes use Mageni Vulnerability Scanner. Is free for 7-days then $39 monthly regardless of how many IPs, scans, deployments or users you have. Cancel at Anytime and 7-days Money-Back Guarantee. Mageni contributes 1% of your subscription to removing CO₂ from the atmosphere.

Get Started For Free
App screenshot