Vulnerability Details : CVE-2008-0882
Double free vulnerability in the process_browse_data function in CUPS 1.3.5 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via crafted UDP Browse packets to the cupsd port (631/udp), related to an unspecified manipulation of a remote printer. NOTE: some of these details are obtained from third party information.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Threat overview for CVE-2008-0882
Top countries where our scanners detected CVE-2008-0882
Top open port discovered on systems with this issue
631
IPs affected by CVE-2008-0882 1
Find out if you* are
affected by CVE-2008-0882!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2008-0882
Probability of exploitation activity in the next 30 days: 12.29%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 95 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-0882
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2008-0882
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-0882
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:051
-
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00792.html
- http://security.gentoo.org/glsa/glsa-200804-01.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:050
-
http://www.securityfocus.com/bid/27906
- http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
- http://www.debian.org/security/2008/dsa-1530
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9625
-
http://www.cups.org/str.php?L2656
- http://www.ubuntu.com/usn/usn-598-1
-
http://www.securitytracker.com/id?1019473
-
http://www.vupen.com/english/advisories/2008/0623
- http://docs.info.apple.com/article.html?artnum=307562
-
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00832.html
- http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00000.html
-
http://www.redhat.com/support/errata/RHSA-2008-0157.html
-
https://bugzilla.redhat.com/show_bug.cgi?id=433758
-
http://www.vupen.com/english/advisories/2008/0924/references
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
Products affected by CVE-2008-0882
- cpe:2.3:a:cups:cups:1.3.5:*:*:*:*:*:*:*