Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title.
References
Link | Resource |
---|---|
http://bzr.linuxfoundation.org/loggerhead/openprinting/foomatic-4.0/foomatic-filters/annotate/head:/ChangeLog | Patch Vendor Advisory |
http://rhn.redhat.com/errata/RHSA-2016-0491.html | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/02/15/1 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/02/15/7 | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html | Third Party Advisory |
https://bugs.linuxfoundation.org/show_bug.cgi?id=515 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1218297 | Issue Tracking |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2016-04-15T14:00:00
Updated: 2016-09-30T13:57:01
Reserved: 2016-02-15T00:00:00
Link: CVE-2010-5325
JSON object: View
NVD Information
Status : Analyzed
Published: 2016-04-15T14:59:00.113
Modified: 2019-12-27T16:08:47.953
Link: CVE-2010-5325
JSON object: View
Redhat Information
No data.
CWE