CVE-2010-5325
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
15/04/2016
Last modified:
12/04/2025
Description
Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:linuxfoundation:foomatic-filters:*:*:*:*:*:*:*:* | 4.0.5 (including) | |
| cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bzr.linuxfoundation.org/loggerhead/openprinting/foomatic-4.0/foomatic-filters/annotate/head:/ChangeLog
- http://rhn.redhat.com/errata/RHSA-2016-0491.html
- http://www.openwall.com/lists/oss-security/2016/02/15/1
- http://www.openwall.com/lists/oss-security/2016/02/15/7
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://bugs.linuxfoundation.org/show_bug.cgi?id=515
- https://bugzilla.redhat.com/show_bug.cgi?id=1218297
- http://bzr.linuxfoundation.org/loggerhead/openprinting/foomatic-4.0/foomatic-filters/annotate/head:/ChangeLog
- http://rhn.redhat.com/errata/RHSA-2016-0491.html
- http://www.openwall.com/lists/oss-security/2016/02/15/1
- http://www.openwall.com/lists/oss-security/2016/02/15/7
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- https://bugs.linuxfoundation.org/show_bug.cgi?id=515
- https://bugzilla.redhat.com/show_bug.cgi?id=1218297



