Executive Summary

Informations
Name CVE-2002-1371 First vendor Publication 2002-12-26
Vendor Cve Last vendor Modification 2017-10-10

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

filters/image-gif.c in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 does not properly check for zero-length GIF images, which allows remote attackers to execute arbitrary code via modified chunk headers, as demonstrated by nogif.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1371

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 13
Os 2

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 232-1 (cupsys)
File : nvt/deb_232_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 232-2 (cupsys)
File : nvt/deb_232_2.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
10743 CUPS image-gif.c Zero-Length GIF Image Header Arbitrary Code Execution

CUPS contains a flaw that may allow a malicious user to execute arbitrary code. The issue is due to image-gif.c improperly handling zero width GIF images. By sending a specially crafted image with the chunk headers, a remote attacker can corrupt memory and execute arbitrary code, resulting in a loss of integrity.

Nessus® Vulnerability Scanner

Date Description
2004-09-29 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-232.nasl - Type : ACT_GATHER_INFO
2004-07-31 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2003-001.nasl - Type : ACT_GATHER_INFO
2004-07-25 Name : The remote host is missing a vendor-supplied security patch
File : suse_SA_2003_002.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/6439
BUGTRAQ http://marc.info/?l=bugtraq&m=104032149026670&w=2
CONECTIVA http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000702
DEBIAN http://www.debian.org/security/2003/dsa-232
MANDRAKE http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:001
MISC http://www.idefense.com/advisory/12.19.02.txt
REDHAT http://www.redhat.com/support/errata/RHSA-2002-295.html
SUSE http://www.novell.com/linux/security/advisories/2003_002_cups.html
VULNWATCH http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/10911

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2021-05-04 12:01:48
  • Multiple Updates
2021-04-22 01:01:55
  • Multiple Updates
2020-05-23 00:15:08
  • Multiple Updates
2017-10-10 09:23:25
  • Multiple Updates
2016-10-18 12:01:05
  • Multiple Updates
2014-02-17 10:25:19
  • Multiple Updates
2013-05-11 12:12:39
  • Multiple Updates