Vulnerability Description
Multiple heap-based buffer overflows in the urftopdf filter in cups-filters 1.0.25 before 1.0.47 allow remote attackers to execute arbitrary code via a large (1) page or (2) line in a URF file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Canonical | Ubuntu Linux | 13.10 |
| Linuxfoundation | Cups-Filters | 1.0.25 |
Related Weaknesses (CWE)
References
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/717Patch
- http://www.securityfocus.com/bid/66601
- http://www.ubuntu.com/usn/USN-2143-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
- https://bugzilla.redhat.com/show_bug.cgi?id=1027547
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/717Patch
- http://www.securityfocus.com/bid/66601
- http://www.ubuntu.com/usn/USN-2143-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
- https://bugzilla.redhat.com/show_bug.cgi?id=1027547
FAQ
What is CVE-2013-6473?
CVE-2013-6473 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Multiple heap-based buffer overflows in the urftopdf filter in cups-filters 1.0.25 before 1.0.47 allow remote attackers to execute arbitrary code via a large (1) page or (2) line in a URF file.
How severe is CVE-2013-6473?
CVE-2013-6473 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6473?
Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Linuxfoundation Cups-Filters.