mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
128 lines
4.0 KiB
JSON
128 lines
4.0 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2010-0542",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "http://cups.org/articles.php?L596",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://cups.org/articles.php?L596"
|
|
},
|
|
{
|
|
"name" : "http://cups.org/str.php?L3516",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://cups.org/str.php?L3516"
|
|
},
|
|
{
|
|
"name" : "http://cups.org/strfiles/3516/str3516.patch",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://cups.org/strfiles/3516/str3516.patch"
|
|
},
|
|
{
|
|
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=587746",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=587746"
|
|
},
|
|
{
|
|
"name" : "DSA-2176",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2011/dsa-2176"
|
|
},
|
|
{
|
|
"name" : "GLSA-201207-10",
|
|
"refsource" : "GENTOO",
|
|
"url" : "http://security.gentoo.org/glsa/glsa-201207-10.xml"
|
|
},
|
|
{
|
|
"name" : "MDVSA-2010:232",
|
|
"refsource" : "MANDRIVA",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232"
|
|
},
|
|
{
|
|
"name" : "MDVSA-2010:234",
|
|
"refsource" : "MANDRIVA",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234"
|
|
},
|
|
{
|
|
"name" : "SUSE-SR:2010:023",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"
|
|
},
|
|
{
|
|
"name" : "40943",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/40943"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:10365",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10365"
|
|
},
|
|
{
|
|
"name" : "1024121",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1024121"
|
|
},
|
|
{
|
|
"name" : "43521",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/43521"
|
|
},
|
|
{
|
|
"name" : "ADV-2011-0535",
|
|
"refsource" : "VUPEN",
|
|
"url" : "http://www.vupen.com/english/advisories/2011/0535"
|
|
}
|
|
]
|
|
}
|
|
}
|