[CVE-2008-1722] CUPS integer overflows in PNG image handling (in files filter/image-{png,zoom}.c)
Bug #219491 reported by
Till Ulen
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
cupsys (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Dapper |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
Edgy |
Won't Fix
|
Undecided
|
Jamie Strandboge | ||
Feisty |
Fix Released
|
Undecided
|
Jamie Strandboge | ||
Gutsy |
Fix Released
|
Undecided
|
Jamie Strandboge |
Bug Description
Binary package hint: cupsys
From the CVE description:
"Multiple integer overflows in (1) filter/image-png.c and (2) filter/image-zoom.c in CUPS 1.3 allow attackers to cause a denial of service (crash) and trigger memory corruption, as demonstrated via a crafted PNG image."
See http://
or http://
CVE References
Changed in cupsys: | |
assignee: | nobody → jamie-strandboge |
status: | New → Confirmed |
assignee: | nobody → jamie-strandboge |
status: | New → Confirmed |
assignee: | nobody → jamie-strandboge |
status: | New → Confirmed |
Changed in cupsys: | |
assignee: | nobody → jamie-strandboge |
status: | New → Confirmed |
To post a comment you must log in.
cupsys (1.3.7-1ubuntu3) hardy; urgency=low
* Add debian/ patches/ CVE-2008- 1722.dpatch: Two integer overflows in png
image filter allow a denial of service attack and possibly arbitrary code
execution. [STR #2790, CVE-2008-1722]. Taken from Debian SVN head.
-- Martin Pitt <email address hidden> Mon, 21 Apr 2008 17:54:33 +0200