Vulnerability Name:

CVE-2002-1368 (CCN-10909)

Assigned:2002-12-19
Published:2002-12-19
Updated:2017-07-11
Summary:Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing negative arguments to be fed into memcpy() calls via HTTP requests with (1) a negative Content-Length value or (2) a negative length in a chunked transfer encoding.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CALDERA
Type: UNKNOWN
CSSA-2003-004.0

Source: CCN
Type: SCO Security Advisory CSSA-2003-004.0
Multiple Security Vulnerabilities in the Common Unix

Source: VULNWATCH
Type: UNKNOWN
20021219 iDEFENSE Security Advisory 12.19.02: Multiple Security Vulnerabilities in Common Unix Printing System (CUPS)

Source: MITRE
Type: CNA
CVE-2002-1368

Source: CONECTIVA
Type: UNKNOWN
CLSA-2003:702

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:702
cups

Source: CCN
Type: AppleCare Knowledge Base Document 61798
Apple Security Updates

Source: BUGTRAQ
Type: UNKNOWN
20021219 iDEFENSE Security Advisory 12.19.02: Multiple Security Vulnerabilities in Common Unix Printing System (CUPS)

Source: CCN
Type: RHSA-2002-295
Updated CUPS packages fix various vulnerabilities

Source: CCN
Type: SA7756
CUPS multiple vulnerabilities

Source: SECUNIA
Type: UNKNOWN
7756

Source: CCN
Type: SA7794
Gentoo updates to CUPS

Source: SECUNIA
Type: UNKNOWN
7794

Source: CCN
Type: SA7803
SuSE updates to CUPS

Source: SECUNIA
Type: UNKNOWN
7803

Source: CCN
Type: SA7843
Mandrake updates to CUPS

Source: SECUNIA
Type: UNKNOWN
7843

Source: CCN
Type: SA7858
RedHat updates to CUPS

Source: SECUNIA
Type: UNKNOWN
7858

Source: CCN
Type: SA7907
Debian updates to cupsys

Source: SECUNIA
Type: UNKNOWN
7907

Source: CCN
Type: SA7913
OpenLinux updates to CUPS

Source: SECUNIA
Type: UNKNOWN
7913

Source: SECUNIA
Type: UNKNOWN
8080

Source: SECUNIA
Type: UNKNOWN
9325

Source: CCN
Type: CUPS Web site
News - Common UNIX Printing System

Source: DEBIAN
Type: UNKNOWN
DSA-232

Source: DEBIAN
Type: DSA-232
cupsys -- several vulnerabilities

Source: MISC
Type: Exploit, Vendor Advisory
http://www.idefense.com/advisory/12.19.02.txt

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:001

Source: SUSE
Type: UNKNOWN
SuSE-SA:2003:002

Source: CCN
Type: OSVDB ID: 10741
CUPS HTTP Request Multiple Header Negative Argument Overflow

Source: REDHAT
Type: UNKNOWN
RHSA-2002:295

Source: BID
Type: UNKNOWN
6437

Source: CCN
Type: BID-6437
CUPS Negative Length HTTP Header Vulnerability

Source: XF
Type: UNKNOWN
cups-neg-memcpy-bo(10909)

Source: XF
Type: UNKNOWN
cups-neg-memcpy-bo(10909)

Source: CCN
Type: iDEFENSE Security Advisory 12.23.02
Multiple Security Vulnerabilities in Common Unix Printing System (CUPS)

Source: SUSE
Type: SUSE-SA:2003:002
cups: local and remote privilege escalation

Vulnerable Configuration:Configuration 1:
  • cpe:/a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20021368
    V
    CVE-2002-1368
    2015-11-16
    oval:org.debian:def:232
    V
    several vulnerabilities
    2003-01-20
    BACK
    easy_software_products cups 1.0.4
    easy_software_products cups 1.0.4_8
    easy_software_products cups 1.1.1
    easy_software_products cups 1.1.4
    easy_software_products cups 1.1.4_2
    easy_software_products cups 1.1.4_3
    easy_software_products cups 1.1.4_5
    easy_software_products cups 1.1.6
    easy_software_products cups 1.1.7
    easy_software_products cups 1.1.10
    easy_software_products cups 1.1.13
    easy_software_products cups 1.1.14
    easy_software_products cups 1.1.17
    apple mac os x 10.2
    apple mac os x 10.2.2
    debian debian linux 2.2
    redhat linux 7
    mandrakesoft mandrake linux 7.2
    suse suse linux 7.1
    redhat linux 7.1
    mandrakesoft mandrake linux 8.0
    suse suse linux 7.2
    conectiva linux 7.0
    mandrakesoft mandrake linux 8.1
    redhat linux 7.2
    suse suse linux 7.3
    mandrakesoft mandrake linux 8.2
    suse suse linux 8.0
    conectiva linux 8.0
    redhat linux 7.3
    debian debian linux 3.0
    redhat linux 8.0
    mandrakesoft mandrake linux 9.0
    suse suse linux 8.1
    suse linux enterprise server 8
    conectiva linux 9.0
    mandrakesoft mandrake linux 8.0
    mandrakesoft mandrake linux 8.1
    mandrakesoft mandrake linux 8.2