Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Metrics
Affected Vendors & Products
References
History
Thu, 24 Apr 2025 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 13 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. | Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. |

Status: PUBLISHED
Assigner: AHA
Published: 2023-09-21T22:47:41.879Z
Updated: 2025-04-23T16:16:13.304Z
Reserved: 2023-08-23T21:14:04.183Z
Link: CVE-2023-4504

Updated: 2024-08-02T07:31:05.906Z

Status : Modified
Published: 2023-09-21T23:15:12.293
Modified: 2025-04-23T17:16:44.910
Link: CVE-2023-4504
