Description
Multiple buffer overflows in the HP-GL/2-to-PostScript filter in CUPS before 1.3.6 might allow remote attackers to execute arbitrary code via a crafted HP-GL/2 file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1625-1 | New cupsys packages fix arbitrary code execution |
Ubuntu USN |
USN-598-1 | CUPS vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T07:32:24.076Z
Reserved: 2008-01-03T00:00:00.000Z
Link: CVE-2008-0053
No data.
Status : Modified
Published: 2008-03-18T23:44:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-0053
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN