DEBIAN-CVE-2002-1369

Source
https://security-tracker.debian.org/tracker/CVE-2002-1369
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2002-1369.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2002-1369
Upstream
Published
2002-12-26T05:00:00Z
Modified
2025-11-14T04:01:11.786092Z
Summary
[none]
Details

jobs.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly use the strncat function call when processing the options string, which allows remote attackers to execute arbitrary code via a buffer overflow attack.

References

Affected packages

Debian:11 / cups

Package

Name
cups
Purl
pkg:deb/debian/cups?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.18-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / cups

Package

Name
cups
Purl
pkg:deb/debian/cups?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.18-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / cups

Package

Name
cups
Purl
pkg:deb/debian/cups?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.18-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / cups

Package

Name
cups
Purl
pkg:deb/debian/cups?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.18-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}