Download
| Alert*
oval:org.secpod.oval:def:508052
The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix: cups: heap buffer overflow may lead to DoS cups: use-after-free in cupsdAcceptClient in scheduler/client.c For more details about the security issue, including the impa ... oval:org.secpod.oval:def:2600403 The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. oval:org.secpod.oval:def:708264 cups: Common UNIX Printing System CUPS could be made to crash or expose sensitive information over the network. oval:org.secpod.oval:def:93220 cups: Common UNIX Printing System CUPS could be made to crash or expose sensitive information over the network. oval:org.secpod.oval:def:2108154 Oracle Solaris 11 - ( CVE-2023-34241 ) oval:org.secpod.oval:def:1601742 A vulnerability was found in CUPS. This issue occurs due to logging data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data immediately before the connection closed, resulting in a use-after-free in cupsdAcceptClient in scheduler/client.c oval:org.secpod.oval:def:508112 The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Security Fix: cups: heap buffer overflow may lead to DoS cups: use-after-free in cupsdAcceptClient in scheduler/client.c For more details about the security issue, including the impa ... oval:org.secpod.oval:def:91410 The host is installed with Apple Mac OS 11 before 11.7.9, Apple Mac OS 12 before 12.6.8 or Apple Mac OS 13 before 13.5 and is prone to an information disclosure vulnerability. A flaw is present in the application, which fails to properly handle issues in state management. On successful exploitation, ... oval:org.secpod.oval:def:125912 CUPS printing system provides a portable printing layer for UNIX operating systems. It has been developed by Apple Inc. to promote a standard printing solution for all UNIX vendors and users. CUPS provides the System V and Berkeley command-line interfaces. oval:org.secpod.oval:def:125879 CUPS printing system provides a portable printing layer for UNIX operating systems. It has been developed by Apple Inc. to promote a standard printing solution for all UNIX vendors and users. CUPS provides the System V and Berkeley command-line interfaces. oval:org.secpod.oval:def:19500305 A vulnerability was found in CUPS. This issue occurs due to logging data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data immediately before the connection closed, resulting in a use-after-free in cupsdAcceptClient in scheduler/client.c oval:org.secpod.oval:def:2501236 The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. oval:org.secpod.oval:def:89049403 This update for cups fixes the following issues: * CVE-2023-4504: Fixed heap overflow in OpenPrinting CUPS Postscript Parsing . * CVE-2023-34241: Fixed a use-after-free problem in cupsdAcceptClient . * CVE-2023-32360: Fixed information leak through Cups-Get-Document operation . oval:org.secpod.oval:def:1701441 A vulnerability was found in CUPS. This issue occurs due to logging data of free memory to the logging service AFTER the connection has been closed, when it should have logged the data immediately before the connection closed, resulting in a use-after-free in cupsdAcceptClient in scheduler/client.c oval:org.secpod.oval:def:89049021 This update for cups fixes the following issues: * CVE-2023-34241: Fixed a use-after-free problem in cupsdAcceptClient . oval:org.secpod.oval:def:91286 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code, cause denial of service, or d ... oval:org.secpod.oval:def:91288 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code, cause denial of service, or d ... oval:org.secpod.oval:def:91287 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to execute arbitrary code, cause denial of service, or d ... |