Integer overflow in filter/texttopdf.c in texttopdf in cups-filters before 1.0.71 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted line size in a print job, which triggers a heap-based buffer overflow.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "cups-browsed",
"binary_version": "1.0.52-0ubuntu1.5"
},
{
"binary_name": "cups-filters",
"binary_version": "1.0.52-0ubuntu1.5"
},
{
"binary_name": "cups-filters-core-drivers",
"binary_version": "1.0.52-0ubuntu1.5"
},
{
"binary_name": "libcupsfilters-dev",
"binary_version": "1.0.52-0ubuntu1.5"
},
{
"binary_name": "libcupsfilters1",
"binary_version": "1.0.52-0ubuntu1.5"
},
{
"binary_name": "libfontembed-dev",
"binary_version": "1.0.52-0ubuntu1.5"
},
{
"binary_name": "libfontembed1",
"binary_version": "1.0.52-0ubuntu1.5"
}
]
}