Description
cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x’s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18.
Published: 2025-11-12
Score: 4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4380-1 cups-filters security update
Ubuntu USN Ubuntu USN USN-7878-1 cups-filters vulnerabilities
History

Tue, 20 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Openprinting cups-filters
CPEs cpe:2.3:a:openprinting:cups-filters:*:*:*:*:*:*:*:*
cpe:2.3:a:openprinting:libcupsfilters:*:*:*:*:*:*:*:*
Vendors & Products Openprinting cups-filters

Tue, 02 Dec 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 13 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Openprinting
Openprinting libcupsfilters
Vendors & Products Openprinting
Openprinting libcupsfilters

Wed, 12 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Wed, 12 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
Description cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In cups-filters prior to 1.28.18, by crafting a PDF file with a large `MediaBox` value, an attacker can cause CUPS-Filter 1.x’s `pdftoraster` tool to write beyond the bounds of an array. First, a PDF with a large `MediaBox` width value causes `header.cupsWidth` to become large. Next, the calculation of `bytesPerLine = (header.cupsBitsPerPixel * header.cupsWidth + 7) / 8` overflows, resulting in a small value. Then, `lineBuf` is allocated with the small `bytesPerLine` size. Finally, `convertLineChunked` calls `writePixel8`, which attempts to write to `lineBuf` outside of its buffer size (out of bounds write). In libcupsfilters, the maintainers found the same `bytesPerLine` multiplication without overflow check, but the provided test case does not cause an overflow there, because the values are different. Commit 50d94ca0f2fa6177613c97c59791bde568631865 contains a patch, which is incorporated into cups-filters version 1.28.18.
Title [BIGSLEEP-434615384] cups-filters 1.x: out of bounds write in pdftoraster
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Openprinting Cups-filters Libcupsfilters
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-13T16:56:18.053Z

Reserved: 2025-11-05T19:12:25.104Z

Link: CVE-2025-64503

cve-icon Vulnrichment

Updated: 2025-11-12T22:05:18.618Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-12T22:15:50.293

Modified: 2026-01-20T18:12:40.827

Link: CVE-2025-64503

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-11-12T22:04:03Z

Links: CVE-2025-64503 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-11-13T15:50:14Z

Weaknesses