![]() |
|
Message-Id: <20150212165405.5C4B66C009C@smtpvmsrv1.mitre.org> Date: Thu, 12 Feb 2015 11:54:05 -0500 (EST) From: cve-assign@...re.org To: kristian.fiskerstrand@...ptuouscapital.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE Request: Cups: cupsRasterReadPixels buffer overflow -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > https://www.cups.org/str.php?L4551 > A malformed compressed raster file can trigger a buffer overflow in > cupsRasterReadPixels. >> causes count (which is unsigned) to wrap around > I can confirm that that patch fixes the buffer overflow Use CVE-2014-9679 for this integer overflow that was fixed in 2.0.2. The scope of this CVE does not include the "nothing that guarantees that r->bpp is non-zero" observation the "Feb 1, 2015" comment. > since compression isn't used between filters and since we use > sandboxing whenever possible, it is unlikely that this will be > exploitable This isn't directly relevant to whether a CVE should exist, but http://cups.org/documentation.php/doc-2.0/man-cups-files.conf.html mentions 'Specifies the level of security sandboxing that is applied to print filters, backends, and other child processes of the scheduler. The default is "strict". This directive is currently only used/supported on OS X.' Apparently some online discussions of CUPS include third-party recommendations to disable sandboxing. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJU3NpOAAoJEKllVAevmvms+zAH/RzYRlzOX/Mm66NVZE5Svr8j XDMba6Yls6khp4rhXsUtIyjwRt+sjag5v+QWiDBv1ZEGJwD72MalgUQwYHOy0AGj fmqu6kiRd2rFU/c95IHj4N5H3NXvsrspWbmo8/p7cBTl5i/zDRCK8rG15SoTEHu/ CUNR3KPeuVawwUzH4dFlWAQkTUP5DL20xPFcJb+kXr/vu7uwxedamjBH8twGVD6v /Pe8ktGAmfYEuj4tbcsj4kyU30U7wCzIAw5uZ2DvtuaP8uLyWeBqYAaWyz/754uC dFbGodPxsMmltshpDPHsRdMzjN5kc6fHAYJzW8r/sqsvR2xNlBV+u1J4Vw06EH4= =2glT -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.