Vulnerability Name:

CVE-2002-1384 (CCN-10937)

Assigned:2002-12-23
Published:2002-12-23
Updated:2018-05-03
Summary:Integer overflow in pdftops, as used in Xpdf 2.01 and earlier, xpdf-i, and CUPS before 1.1.18, allows local users to execute arbitrary code via a ColorSpace entry with a large number of elements, as demonstrated by cups-pdf.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Xpdf FTP site
/pub/xpdf/

Source: MITRE
Type: CNA
CVE-2002-1384

Source: CCN
Type: Conectiva Linux Security Announcement CLSA-2003:702
cups

Source: GENTOO
Type: UNKNOWN
GLSA-200301-1

Source: CCN
Type: RHSA-2002-295
Updated CUPS packages fix various vulnerabilities

Source: CCN
Type: RHSA-2002-307
xpdf security update

Source: CCN
Type: RHSA-2003-037
Updated Xpdf packages fix security vulnerability

Source: CCN
Type: RHSA-2003-216
Updated Xpdf packages fix security vulnerability

Source: CCN
Type: CIAC Information Bulletin N-040
Red Hat Xpdf Packages Vulnerability

Source: CCN
Type: CUPS Web site
News - Common UNIX Printing System

Source: DEBIAN
Type: UNKNOWN
DSA-222

Source: DEBIAN
Type: UNKNOWN
DSA-226

Source: DEBIAN
Type: UNKNOWN
DSA-232

Source: DEBIAN
Type: DSA-222
xpdf -- integer overflow

Source: DEBIAN
Type: DSA-226
xpdf-i -- integer overflow

Source: DEBIAN
Type: DSA-232
cupsys -- several vulnerabilities

Source: CCN
Type: Xpdf Web site
Xpdf

Source: MISC
Type: Exploit, Patch, Vendor Advisory
http://www.idefense.com/advisory/12.23.02.txt

Source: CCN
Type: Gentoo Linux Security Announcement 200301-1
xpdf -- integer overflow

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:001

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:002

Source: SUSE
Type: UNKNOWN
SUSE-SA:2003:002

Source: REDHAT
Type: UNKNOWN
RHSA-2002:295

Source: REDHAT
Type: UNKNOWN
RHSA-2002:307

Source: REDHAT
Type: UNKNOWN
RHSA-2003:037

Source: REDHAT
Type: UNKNOWN
RHSA-2003:216

Source: BID
Type: UNKNOWN
6475

Source: CCN
Type: BID-6475
Xpdf/CUPS pdftops Integer Overflow Vulnerability

Source: CCN
Type: TLSA-2003-3
Integer overflow

Source: CCN
Type: TLSA-2003-4
Integer overflow

Source: XF
Type: UNKNOWN
pdftops-integer-overflow(10937)

Source: XF
Type: UNKNOWN
pdftops-integer-overflow(10937)

Source: CCN
Type: iDEFENSE Security Advisory 12.23.02
Integer Overflow in pdftops

Source: SUSE
Type: SUSE-SA:2003:002
cups: local and remote privilege escalation

Vulnerable Configuration:Configuration 1:
  • cpe:/a:easy_software_products:cups:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.0.4_8:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.4_2:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.4_3:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.4_5:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
  • OR cpe:/a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.90:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:0.91:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:1.0a:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:xpdf:xpdf:2.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:8:*:*:*:server:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:6.0:*:*:*:workstation:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:ia64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:ppc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20021384
    V
    CVE-2002-1384
    2015-11-16
    oval:org.debian:def:232
    V
    several vulnerabilities
    2003-01-20
    oval:org.debian:def:226
    V
    integer overflow
    2003-01-10
    oval:org.debian:def:222
    V
    integer overflow
    2003-01-06
    BACK
    easy_software_products cups 1.0.4
    easy_software_products cups 1.0.4_8
    easy_software_products cups 1.1.1
    easy_software_products cups 1.1.4
    easy_software_products cups 1.1.4_2
    easy_software_products cups 1.1.4_3
    easy_software_products cups 1.1.4_5
    easy_software_products cups 1.1.6
    easy_software_products cups 1.1.7
    easy_software_products cups 1.1.10
    easy_software_products cups 1.1.13
    easy_software_products cups 1.1.14
    easy_software_products cups 1.1.17
    xpdf xpdf 0.90
    xpdf xpdf 0.91
    xpdf xpdf 1.0
    xpdf xpdf 1.0a
    xpdf xpdf 1.1
    xpdf xpdf 2.0
    xpdf xpdf 2.1
    foolabs xpdf 2.01
    redhat linux 6.2
    debian debian linux 2.2
    redhat linux 7
    mandrakesoft mandrake linux 7.2
    suse suse linux 7.1
    redhat linux 7.1
    mandrakesoft mandrake linux 8.0
    suse suse linux 7.2
    conectiva linux 7.0
    mandrakesoft mandrake linux 8.1
    redhat linux 7.2
    suse suse linux 7.3
    mandrakesoft mandrake linux 8.2
    suse suse linux 8.0
    conectiva linux 8.0
    redhat linux 7.3
    debian debian linux 3.0
    gentoo linux *
    redhat linux 8.0
    mandrakesoft mandrake linux 9.0
    suse suse linux 8.1
    suse linux enterprise server 8
    turbolinux turbolinux 8
    turbolinux turbolinux workstation 6.0
    redhat enterprise linux 2.1
    conectiva linux 9.0
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 8.0
    mandrakesoft mandrake linux 8.1
    mandrakesoft mandrake linux 8.2