Executive Summary

Informations
Name CVE-2013-6476 First vendor Publication 2014-03-14
Vendor Cve Last vendor Modification 2014-03-17

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 4.4 Attack Range Local
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The OPVPWrapper::loadDriver function in oprs/OPVPWrapper.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows local users to gain privileges via a Trojan horse driver in the same directory as the PDF file.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:23447
 
Oval ID: oval:org.mitre.oval:def:23447
Title: USN-2143-1 -- cups-filters vulnerabilities
Description: cups-filters could be made to run programs as the lp user if it processed a specially crafted file.
Family: unix Class: patch
Reference(s): USN-2143-1
CVE-2013-6473
CVE-2013-6474
CVE-2013-6475
CVE-2013-6476
Version: 5
Platform(s): Ubuntu 13.10
Ubuntu 12.10
Ubuntu 12.04
Product(s): cups-filters
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23833
 
Oval ID: oval:org.mitre.oval:def:23833
Title: DSA-2876-1 cups - security update
Description: Florian Weimer of the Red Hat Product Security Team discovered multiple vulnerabilities in the pdftoopvp CUPS filter, which could result in the execution of arbitrary code if a malformed PDF file is processed.
Family: unix Class: patch
Reference(s): DSA-2876-1
CVE-2013-6474
CVE-2013-6475
CVE-2013-6476
Version: 5
Platform(s): Debian GNU/Linux 6.0
Debian GNU/kFreeBSD 6.0
Product(s): cups
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:23973
 
Oval ID: oval:org.mitre.oval:def:23973
Title: DSA-2875-1 cups-filters - security update
Description: Florian Weimer of the Red Hat Product Security Team discovered multiple vulnerabilities in the pdftoopvp CUPS filter, which could result in the execution of arbitrary code if a malformed PDF file is processed.
Family: unix Class: patch
Reference(s): DSA-2875-1
CVE-2013-6474
CVE-2013-6475
CVE-2013-6476
Version: 5
Platform(s): Debian GNU/Linux 7
Debian GNU/kFreeBSD 7
Product(s): cups-filters
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:24380
 
Oval ID: oval:org.mitre.oval:def:24380
Title: USN-2144-1 -- cups vulnerabilities
Description: CUPS could be made to run programs as the lp user if it processed a specially crafted file.
Family: unix Class: patch
Reference(s): USN-2144-1
CVE-2013-6474
CVE-2013-6475
CVE-2013-6476
Version: 5
Platform(s): Ubuntu 10.04
Product(s): cups
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 48
Os 4
Os 1
Os 1

Nessus® Vulnerability Scanner

Date Description
2015-03-30 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-100.nasl - Type : ACT_GATHER_INFO
2014-06-17 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201406-16.nasl - Type : ACT_GATHER_INFO
2014-03-17 Name : The remote Fedora host is missing a security update.
File : fedora_2014-3738.nasl - Type : ACT_GATHER_INFO
2014-03-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2875.nasl - Type : ACT_GATHER_INFO
2014-03-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2876.nasl - Type : ACT_GATHER_INFO
2014-03-13 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2143-1.nasl - Type : ACT_GATHER_INFO
2014-03-13 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2144-1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/...
https://bugzilla.redhat.com/show_bug.cgi?id=1027551
DEBIAN http://www.debian.org/security/2014/dsa-2875
http://www.debian.org/security/2014/dsa-2876
UBUNTU http://www.ubuntu.com/usn/USN-2143-1
http://www.ubuntu.com/usn/USN-2144-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
Date Informations
2023-07-14 01:07:02
  • Multiple Updates
2021-05-04 12:28:11
  • Multiple Updates
2021-04-22 01:34:00
  • Multiple Updates
2020-05-24 01:12:41
  • Multiple Updates
2020-05-23 00:38:42
  • Multiple Updates
2015-03-31 13:28:04
  • Multiple Updates
2014-06-18 13:26:15
  • Multiple Updates
2014-03-18 13:23:08
  • First insertion