Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3594-1 | cups security update |
![]() |
EUVD-2023-54359 | Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. |
![]() |
USN-6391-1 | CUPS vulnerability |
![]() |
USN-6391-2 | CUPS vulnerability |
![]() |
USN-6392-1 | libppd vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 24 Apr 2025 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 13 Feb 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. | Due to failure in validating the length provided by an attacker-crafted PPD PostScript document, CUPS and libppd are susceptible to a heap-based buffer overflow and possibly code execution. This issue has been fixed in CUPS version 2.4.7, released in September of 2023. |

Status: PUBLISHED
Assigner: AHA
Published:
Updated: 2025-04-23T16:16:13.304Z
Reserved: 2023-08-23T21:14:04.183Z
Link: CVE-2023-4504

Updated: 2024-08-02T07:31:05.906Z

Status : Modified
Published: 2023-09-21T23:15:12.293
Modified: 2025-04-23T17:16:44.910
Link: CVE-2023-4504


No data.