Vulnerability Details : CVE-2007-4351
Off-by-one error in the ippReadIO function in cups/ipp.c in CUPS 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted (1) textWithLanguage or (2) nameWithLanguage Internet Printing Protocol (IPP) tag, leading to a stack-based buffer overflow.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2007-4351
- cpe:2.3:a:cups:cups:*:*:*:*:*:*:*:*
Threat overview for CVE-2007-4351
Top countries where our scanners detected CVE-2007-4351
Top open port discovered on systems with this issue
631
IPs affected by CVE-2007-4351 2,957
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2007-4351!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2007-4351
4.50%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-4351
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2007-4351
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-4351
-
Red Hat 2007-11-09Vulnerable. This issue affected the CUPS packages in Red Hat Enterprise Linux 5. This issue also affected the versions of CUPS packages in Red Hat Enterprise Linux 3 and 4, but exploitation would only lead to a possible denial of service. Updates are available from https://rhn.redhat.com/cve/CVE-2007-4351.html
References for CVE-2007-4351
-
http://www.kb.cert.org/vuls/id/446897
VU#446897 - CUPS buffer overflow vulnerabilityUS Government Resource
-
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.501902
The Slackware Linux Project: Slackware Security Advisories
-
http://support.avaya.com/elmodocs2/security/ASA-2007-476.htm
ASA-2007-476 (RHSA-2007-1023)
-
http://www.vupen.com/english/advisories/2007/4238
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://docs.info.apple.com/article.html?artnum=307179
-
http://www.vupen.com/english/advisories/2008/1934/references
Site en construction
-
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
Page Not Found | CISAUS Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/38190
CUPS ippReadIO function buffer overflow CVE-2007-4351 Vulnerability Report
-
http://security.gentoo.org/glsa/glsa-200711-16.xml
CUPS: Memory corruption (GLSA 200711-16) — Gentoo security
-
https://usn.ubuntu.com/539-1/
404: Page not found | Ubuntu
-
http://www.cups.org/str.php?L2561
Page Has Moved - CUPS.org
-
https://bugzilla.redhat.com/show_bug.cgi?id=361661
361661 – CVE-2007-4351 cups boundary error [F7]
-
http://www.vupen.com/english/advisories/2007/3681
Site en construction
-
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00012.html
[SECURITY] Fedora 7 Update: cups-1.2.12-6.fc7
-
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
-
http://www.debian.org/security/2007/dsa-1407
[SECURITY] [DSA 1407-1] New cupsys packages fix arbitrary code execution
-
http://www.securityfocus.com/bid/26268
-
http://www.cisco.com/en/US/products/products_security_response09186a00809a1f11.html
Products, Solutions, and Services - Cisco
-
http://www.novell.com/linux/security/advisories/2007_58_cups.html
404 Page Not Found | SUSE
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10604
404 Not Found
-
http://www.securitytracker.com/id?1018879
Access Denied
-
http://www.mandriva.com/security/advisories?name=MDKSA-2007:204
Mandriva
-
http://www.redhat.com/support/errata/RHSA-2007-1022.html
Support
-
http://www.redhat.com/support/errata/RHSA-2007-1020.html
Support
-
http://www.redhat.com/support/errata/RHSA-2007-1023.html
Support
-
https://issues.rpath.com/browse/RPL-1875
Jump to