Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

SuSE Update for cups SUSE-SA:2007:058

Information

Severity

Severity

Critical

Family

Family

SuSE Local Security Checks

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

15 years ago

Modified

Modified

6 years ago

Summary

Check for the Version of cups

Insight

Insight

A missing length check in the IPP implementation of cups could lead to a buffer overflow. Attackers could exploit that to crash cupsd or to potentially even execute arbitrary code with root privileges CVE-2007-4351. On SUSE Linux 10.1 and 10.0 as well as on all SLES based products only crashing cupsd is possible. A cummulative update that integrates other fixes for SLES will be released later.

Affected Software

Affected Software

cups on SUSE LINUX 10.1, openSUSE 10.2, openSUSE 10.3

Solution

Solution

Please Install the Updated Packages.

Common Vulnerabilities and Exposures (CVE)