Search for vulnerabilities
Vulnerability details: VCID-qr1m-82jb-aaad
Vulnerability ID VCID-qr1m-82jb-aaad
Aliases CVE-2008-5183
Summary cupsd in CUPS 1.3.9 and earlier allows local users, and possibly remote attackers, to cause a denial of service (daemon crash) by adding a large number of RSS Subscriptions, which triggers a NULL pointer dereference. NOTE: this issue can be triggered remotely by leveraging CVE-2008-5184.
Status Published
Exploitability 2.0
Weighted Severity 6.8
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (2)
System Score Found at
rhas Moderate https://access.redhat.com/errata/RHSA-2008:1029
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.01973 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.02531 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.02531 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.02531 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.02531 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.03036 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.03036 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.03036 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.03036 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.03036 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.03036 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.03036 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.03036 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.03036 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.03036 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.03036 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.03036 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
epss 0.04482 https://api.first.org/data/v1/epss?cve=CVE-2008-5183
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=473901
cvssv2 4.3 https://nvd.nist.gov/vuln/detail/CVE-2008-5183
cvssv3 7.5 https://nvd.nist.gov/vuln/detail/CVE-2008-5183
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2008-5183
Reference id Reference type URL
http://lab.gnucitizen.org/projects/cups-0day
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5183.json
https://api.first.org/data/v1/epss?cve=CVE-2008-5183
https://bugs.launchpad.net/ubuntu/+source/cups/+bug/298241
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5183
http://secunia.com/advisories/33937
http://secunia.com/advisories/43521
https://exchange.xforce.ibmcloud.com/vulnerabilities/46684
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10586
http://support.apple.com/kb/HT3438
https://www.exploit-db.com/exploits/7150
http://www.debian.org/security/2011/dsa-2176
http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/
http://www.mandriva.com/security/advisories?name=MDVSA-2009:028
http://www.openwall.com/lists/oss-security/2008/11/19/3
http://www.openwall.com/lists/oss-security/2008/11/19/4
http://www.openwall.com/lists/oss-security/2008/11/20/1
http://www.redhat.com/support/errata/RHSA-2008-1029.html
http://www.securityfocus.com/bid/32419
http://www.securitytracker.com/id?1021396
http://www.vupen.com/english/advisories/2009/0422
http://www.vupen.com/english/advisories/2011/0535
473901 https://bugzilla.redhat.com/show_bug.cgi?id=473901
506180 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506180
cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*
cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
CVE-2008-5183 https://nvd.nist.gov/vuln/detail/CVE-2008-5183
OSVDB-50351;CVE-2008-5183 Exploit https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/7150.html
RHSA-2008:1029 https://access.redhat.com/errata/RHSA-2008:1029
USN-707-1 https://usn.ubuntu.com/707-1/
Data source Exploit-DB
Date added Nov. 17, 2008
Description CUPS 1.3.7 - Cross-Site Request Forgery (Add RSS Subscription) Remote Crash
Ransomware campaign use Known
Source publication date Nov. 18, 2008
Exploit type dos
Platform linux
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2008-5183
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2008-5183
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2008-5183
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.81928
EPSS Score 0.01973
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.