CVE-2007-5849
Summary
| CVE | CVE-2007-5849 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-12-19 21:46:00 UTC |
| Updated | 2017-07-29 01:33:00 UTC |
| Description | Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) for CUPS 1.2 through 1.3.4 allows remote attackers to execute arbitrary code via a crafted SNMP response that triggers a stack-based buffer overflow. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Gentoo Linux Documentation
--
CUPS: Multiple vulnerabilities |
GENTOO |
www.gentoo.org |
|
| Webmail - OVH |
VUPEN |
www.vupen.com |
Vendor Advisory |
| Apple Mac OS X Security Update Fixes Multiple Vulnerabilities - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| US-CERT Technical Cyber Security Alert TA07-352A -- Apple Updates for Multiple Vulnerabilities |
CERT |
www.us-cert.gov |
US Government Resource |
| IBM X-Force Exchange |
XF |
exchange.xforce.ibmcloud.com |
|
| SUSE Update for Multiple Packages - Secunia Advisories - Vulnerability Intelligence - Secunia.com |
SECUNIA |
secunia.com |
Vendor Advisory |
| USN-563-1: CUPS vulnerabilities | Ubuntu |
UBUNTU |
www.ubuntu.com |
|
| About Security Update 2007-009 |
CONFIRM |
docs.info.apple.com |
|
| Debian -- Security Information -- DSA-1437-1 cupsys |
DEBIAN |
www.debian.org |
|
| APPLE-SA-2007-12-17 Security Update 2007-009 |
APPLE |
lists.apple.com |
|
| Gentoo update for cups - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| IBM X-Force Exchange |
XF |
exchange.xforce.ibmcloud.com |
|
| [security-announce] SUSE Security Announcement: cups (SUSE-SA:2008:002) |
SUSE |
lists.opensuse.org |
|
| Apple Mac OS X v10.5.1 2007-009 Multiple Security Vulnerabilities |
BID |
www.securityfocus.com |
|
| Fedora 8 Update: cups-1.3.5-2.fc8 |
FEDORA |
www.redhat.com |
|
| Fedora update for cups - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH |
VUPEN |
www.vupen.com |
Vendor Advisory |
| Common UNIX Printing System SNMP 'asn1_get_string()' Remote Buffer Overflow Vulnerability |
BID |
www.securityfocus.com |
|
| CUPS SNMP Backend "asn1_get_string()" Signedness Vulnerability - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| Security Announcement |
SUSE |
www.novell.com |
|
| Debian update for cupsys - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| Advisories | Mandriva |
MANDRIVA |
www.mandriva.com |
|
| SNMP backend integer underflow/stack overflow in asn1_get_string() · Issue #2589 · apple/cups · GitHub |
CONFIRM |
www.cups.org |
|
| Ubuntu update for cups - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| SUSE update for cups - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| Gentoo Bug 201570 - net-print/cups < 1.2.12-r4 SNMP backend buffer overflow (CVE-2007-5849) |
CONFIRM |
bugs.gentoo.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|
| Red Hat | 2008-01-02 | Joshua Bressers | Not vulnerable. This flaw does not affect the version of CUPS shipped in Red Hat Enterprise Linux 3 or 4. After a detailed analysis of this flaw, it has been determined it does not pose a security threat on Red Hat Enterprise Linux 5. For more details regarding this analysis, please see: https://bugzilla.redhat.com/show_bug.cgi?id=415131 |
There are currently no legacy QID mappings associated with this CVE.