CVE-2023-34095

cpdb-libs provides frontend and backend libraries for the Common Printing Dialog Backends (CPDB) project. In versions 1.0 through 2.0b4, cpdb-libs is vulnerable to buffer overflows via improper use of `scanf(3)`. cpdb-libs uses the `fscanf()` and `scanf()` functions to parse command lines and configuration files, dropping the read string components into fixed-length buffers, but does not limit the length of the strings to be read by `fscanf()` and `scanf()` causing buffer overflows when a string is longer than 1023 characters. A patch for this issue is available at commit f181bd1f14757c2ae0f17cc76dc20421a40f30b7. As all buffers have a length of 1024 characters, the patch limits the maximum string length to be read to 1023 by replacing all occurrences of `%s` with `%1023s` in all calls of the `fscanf()` and `scanf()` functions.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
GitHub_MCNA
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 48%
VendorProductVersion
openprintingcpdb-libs
1.0 ≤
𝑥
< 2.0
openprintingcpdb-libs
2.0:beta1
openprintingcpdb-libs
2.0:beta2
openprintingcpdb-libs
2.0:beta3
openprintingcpdb-libs
2.0:beta4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
cpdb-libs
bookworm
1.2.0-2+deb12u1
fixed
sid
2.0~b5-1.2
fixed
trixie
2.0~b5-1.2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
cpdb-libs
oracular
Fixed 2.0~b4-0ubuntu4
released
noble
Fixed 2.0~b4-0ubuntu4
released
mantic
Fixed 2.0~b4-0ubuntu4
released
lunar
Fixed 2.0~b4-0ubuntu2.1
released
kinetic
Fixed 1.2.0-0ubuntu8.1.22.10.1
released
jammy
Fixed 1.2.0-0ubuntu8.1.22.04.1
released
focal
Fixed 1.2.0-0ubuntu7.1
released
bionic
needed
xenial
dne
trusty
dne