CVE-2002-1368

CUPS 1.1.14-1.1.17 - DoS, RCE

Title source: llm
STIX 2.1

Description

Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing negative arguments to be fed into memcpy() calls via HTTP requests with (1) a negative Content-Length value or (2) a negative length in a chunked transfer encoding.

Exploits (1)

exploitdb WORKING POC VERIFIED
by iDefense · textremotelinux
https://www.exploit-db.com/exploits/22106

References (20)

Core 20
Core References
Vendor Advisory vendor-advisory x_refsource_mandrake
http://www.mandriva.com/security/advisories?name=MDKSA-2003:001
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/10909
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/7858
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/7843
Third Party Advisory mailing-list x_refsource_vulnwatch
http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/9325/
Vendor Advisory vendor-advisory x_refsource_conectiva
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000702
Various Sources vendor-advisory x_refsource_caldera
ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-004.0.txt
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/7756/
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/7907
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/7913/
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/7794
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2003/dsa-232
Vendor Advisory vendor-advisory x_refsource_suse
http://www.novell.com/linux/security/advisories/2003_002_cups.html
Exploit, Vendor Advisory x_refsource_misc
http://www.idefense.com/advisory/12.19.02.txt
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2002-295.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/6437
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/7803
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/8080/
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=104032149026670&w=2

Scores

EPSS 0.2675
EPSS Percentile 96.4%

Details

Status published
Products (15)
apple/mac_os_x 10.2
apple/mac_os_x 10.2.2
easy_software_products/cups 1.0.4
easy_software_products/cups 1.0.4_8
easy_software_products/cups 1.1.1
easy_software_products/cups 1.1.4
easy_software_products/cups 1.1.4_2
easy_software_products/cups 1.1.4_3
easy_software_products/cups 1.1.4_5
easy_software_products/cups 1.1.6
... and 5 more
Published Dec 26, 2002
Tracked Since Feb 18, 2026