Vulnerability Details : CVE-2013-6474
Heap-based buffer overflow in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows remote attackers to execute arbitrary code via a crafted PDF file.
Vulnerability category: OverflowExecute code
Products affected by CVE-2013-6474
- cpe:2.3:o:debian:debian_linux:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:*:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:*:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.44:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.43:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.35:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.34:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.27:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.26:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.45:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.38:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.36:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.29:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.28:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.37:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.40:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.39:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.31:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.30:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.42:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.41:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.33:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.32:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.24:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.22:*:*:*:*:*:*:*
- cpe:2.3:a:linuxfoundation:cups-filters:1.0.23:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-6474
6.65%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-6474
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2013-6474
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-6474
-
http://www.securityfocus.com/bid/66163
cups-filters 'pdftoopvp' Filter Remote Heap Buffer Overflow Vulnerability
-
http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176
/openprinting/cups-filters : revision 7176Patch
-
http://www.debian.org/security/2014/dsa-2875
Debian -- Security Information -- DSA-2875-1 cups-filters
-
http://www.debian.org/security/2014/dsa-2876
Debian -- Security Information -- DSA-2876-1 cups
-
http://www.ubuntu.com/usn/USN-2143-1
USN-2143-1: cups-filters vulnerabilities | Ubuntu security notices
-
https://bugzilla.redhat.com/show_bug.cgi?id=1027548
1027548 – (CVE-2013-6474) CVE-2013-6474 cups-filters: heap-based buffer overflow flaw in pdftoopvp
-
http://www.ubuntu.com/usn/USN-2144-1
USN-2144-1: CUPS vulnerabilities | Ubuntu security notices
Jump to