| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.0 | $0-$5k | 0.00 |
Summary
A vulnerability classified as critical has been found in Debian Linux up to 1.0.46. Affected by this issue is some unknown functionality of the component Filters. Performing a manipulation results in memory corruption. This vulnerability is cataloged as CVE-2013-6474. There is no exploit available. It is recommended to upgrade the affected component.
Details
A vulnerability, which was classified as critical, was found in Debian Linux up to 1.0.46 (Operating System). This affects some unknown processing of the component Filters. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Heap-based buffer overflow in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows remote attackers to execute arbitrary code via a crafted PDF file.
The weakness was shared 03/14/2014 by Florian Weimer with Red Hat Product Security Team (Website). It is possible to read the advisory at bzr.linuxfoundation.org. This vulnerability is uniquely identified as CVE-2013-6474 since 11/04/2013. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. The technical details are unknown and an exploit is not publicly available.
The vulnerability scanner Nessus provides a plugin with the ID 72979 (Ubuntu 10.04 LTS : cups vulnerabilities (USN-2144-1)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Ubuntu Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 195753 (Ubuntu Security Notification for Cups-filters Vulnerabilities (USN-2143-1)).
Upgrading to version 1.0.47 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (91911), Tenable (72979), SecurityFocus (BID 66163†) and Vulnerability Center (SBV-43776†). The entries VDB-12823, VDB-66640 and VDB-66638 are related to this item. Be aware that VulDB is the high quality source for vulnerability data.
Product
Type
Vendor
Name
Version
- 1.0.0
- 1.0.1
- 1.0.2
- 1.0.3
- 1.0.4
- 1.0.5
- 1.0.6
- 1.0.7
- 1.0.8
- 1.0.9
- 1.0.10
- 1.0.11
- 1.0.12
- 1.0.13
- 1.0.14
- 1.0.15
- 1.0.16
- 1.0.17
- 1.0.18
- 1.0.19
- 1.0.20
- 1.0.21
- 1.0.22
- 1.0.23
- 1.0.24
- 1.0.25
- 1.0.26
- 1.0.27
- 1.0.28
- 1.0.29
- 1.0.30
- 1.0.31
- 1.0.32
- 1.0.33
- 1.0.34
- 1.0.35
- 1.0.36
- 1.0.37
- 1.0.38
- 1.0.39
- 1.0.40
- 1.0.41
- 1.0.42
- 1.0.43
- 1.0.44
- 1.0.45
- 1.0.46
License
Website
- Vendor: https://www.debian.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 7.0
VulDB Base Score: 7.3
VulDB Temp Score: 7.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 72979
Nessus Name: Ubuntu 10.04 LTS : cups vulnerabilities (USN-2144-1)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 867598
OpenVAS Name: Fedora Update for cups-filters FEDORA-2014-3738
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Linux 1.0.47
Timeline
11/04/2013 🔍03/12/2014 🔍
03/12/2014 🔍
03/13/2014 🔍
03/14/2014 🔍
03/14/2014 🔍
03/27/2014 🔍
03/24/2015 🔍
02/03/2022 🔍
Sources
Vendor: debian.orgAdvisory: USN-2144-1
Researcher: Florian Weimer
Organization: Red Hat Product Security Team
Status: Not defined
Confirmation: 🔍
CVE: CVE-2013-6474 (🔍)
GCVE (CVE): GCVE-0-2013-6474
GCVE (VulDB): GCVE-100-66639
OVAL: 🔍
X-Force: 91911
SecurityFocus: 66163 - cups-filters 'pdftoopvp' Filter Remote Heap Buffer Overflow Vulnerability
Vulnerability Center: 43776 - cups-filters <1.0.47 Remote Code Execution due to Buffer Overflow in pdftoopvp Filter via Crafted PDF File, Medium
See also: 🔍
Entry
Created: 03/24/2015 15:54Updated: 02/03/2022 15:03
Changes: 03/24/2015 15:54 (70), 05/24/2017 10:40 (7), 02/03/2022 15:00 (3), 02/03/2022 15:03 (2)
Complete: 🔍
Cache ID: 216::103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.