source: http://www.securityfocus.com/bid/11968/info
CUPS is reported prone to a remote buffer overflow vulnerability. The issue is reported to exist in the 'hpgl-input.c' source file and is because of a lack of sufficient boundary checks performed on data contained in HPGL files.
A remote attacker may exploit this condition to execute arbitrary code in the context of the vulnerable CUPS daemon.
http://www.exploit-db.com/sploits/24977.gz
暂无评论