Vulnerability Details : CVE-2007-5849
Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) for CUPS 1.2 through 1.3.4 allows remote attackers to execute arbitrary code via a crafted SNMP response that triggers a stack-based buffer overflow.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2007-5849
Probability of exploitation activity in the next 30 days: 42.90%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 97 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2007-5849
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2007-5849
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-5849
-
Red Hat 2008-01-02Not vulnerable. This flaw does not affect the version of CUPS shipped in Red Hat Enterprise Linux 3 or 4. After a detailed analysis of this flaw, it has been determined it does not pose a security threat on Red Hat Enterprise Linux 5. For more details regarding this analysis, please see: https://bugzilla.redhat.com/show_bug.cgi?id=415131
- http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
-
http://www.vupen.com/english/advisories/2007/4238
Webmail: access your OVH emails on ovhcloud.com | OVHcloudVendor Advisory
- http://docs.info.apple.com/article.html?artnum=307179
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/39101
-
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
Page Not Found | CISAUS Government Resource
- http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00003.html
-
http://bugs.gentoo.org/show_bug.cgi?id=201570
- http://www.gentoo.org/security/en/glsa/glsa-200712-14.xml
-
http://www.securityfocus.com/bid/26917
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/39097
- http://www.ubuntu.com/usn/usn-563-1
-
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00908.html
-
http://www.vupen.com/english/advisories/2007/4242
Vendor Advisory
- http://www.debian.org/security/2007/dsa-1437
- http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:036
-
http://www.cups.org/str.php?L2589
- http://www.securityfocus.com/bid/26910
- cpe:2.3:a:easy_software_products:cups:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.2.9:*:*:*:*:*:*:*