CVE-2013-6473
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
14/03/2014
Last modified:
12/04/2025
Description
Multiple heap-based buffer overflows in the urftopdf filter in cups-filters 1.0.25 before 1.0.47 allow remote attackers to execute arbitrary code via a large (1) page or (2) line in a URF file.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.25:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.26:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.27:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.28:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.29:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.30:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.31:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.32:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.33:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.34:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.35:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.36:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.37:*:*:*:*:*:*:* | ||
cpe:2.3:a:linuxfoundation:cups-filters:1.0.38:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7175
- http://www.securityfocus.com/bid/66601
- http://www.ubuntu.com/usn/USN-2143-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
- https://bugzilla.redhat.com/show_bug.cgi?id=1027547
- http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7175
- http://www.securityfocus.com/bid/66601
- http://www.ubuntu.com/usn/USN-2143-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=741333
- https://bugzilla.redhat.com/show_bug.cgi?id=1027547