Vulnerability Details : CVE-2007-5849
Integer underflow in the asn1_get_string function in the SNMP back end (backend/snmp.c) for CUPS 1.2 through 1.3.4 allows remote attackers to execute arbitrary code via a crafted SNMP response that triggers a stack-based buffer overflow.
Vulnerability category: OverflowExecute code
Products affected by CVE-2007-5849
- cpe:2.3:a:easy_software_products:cups:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.2.9:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-5849
43.41%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-5849
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2007-5849
-
Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-5849
-
Red Hat 2008-01-02Not vulnerable. This flaw does not affect the version of CUPS shipped in Red Hat Enterprise Linux 3 or 4. After a detailed analysis of this flaw, it has been determined it does not pose a security threat on Red Hat Enterprise Linux 5. For more details regarding this analysis, please see: https://bugzilla.redhat.com/show_bug.cgi?id=415131
References for CVE-2007-5849
-
http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
-
http://www.vupen.com/english/advisories/2007/4238
Webmail: access your OVH emails on ovhcloud.com | OVHcloudVendor Advisory
-
http://docs.info.apple.com/article.html?artnum=307179
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/39101
CUPS SNMP asn1_get_string() buffer overflow CVE-2007-5849 Vulnerability Report
-
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
Page Not Found | CISAUS Government Resource
-
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00003.html
[security-announce] SUSE Security Announcement: cups (SUSE-SA:2008:002) - openSUSE Security Announce - openSUSE Mailing Lists
-
http://bugs.gentoo.org/show_bug.cgi?id=201570
201570 – net-print/cups < 1.2.12-r4 SNMP backend buffer overflow (CVE-2007-5849)
-
http://www.gentoo.org/security/en/glsa/glsa-200712-14.xml
CUPS: Multiple vulnerabilities (GLSA 200712-14) — Gentoo security
-
http://www.securityfocus.com/bid/26917
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/39097
Vulnerability Report
-
http://www.ubuntu.com/usn/usn-563-1
USN-563-1: CUPS vulnerabilities | Ubuntu security notices | Ubuntu
-
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00908.html
Fedora 8 Update: cups-1.3.5-2.fc8
-
http://www.vupen.com/english/advisories/2007/4242
Site en constructionVendor Advisory
-
http://www.debian.org/security/2007/dsa-1437
[SECURITY] [DSA 1437-1] New cupsys packages fix several vulnerabilities
-
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
-
http://www.mandriva.com/security/advisories?name=MDVSA-2008:036
Mandriva
-
http://www.cups.org/str.php?L2589
Page Has Moved - CUPS.org
-
http://www.securityfocus.com/bid/26910
Jump to