CVE-2025-64503
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| openprinting | cups-filters | 1.28.18 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
Update cups-filters to version 1.28.18 or later, which contains the patch fixing the out-of-bounds write vulnerability caused by crafted PDF files with large MediaBox values.
How can this vulnerability impact me? :
The vulnerability can cause an out-of-bounds write in the pdftoraster tool of cups-filters, which may lead to a denial of service or potentially allow an attacker to execute arbitrary code or corrupt memory. The CVSS score indicates a low to medium impact with no confidentiality or integrity loss but with availability impact.
Can you explain this vulnerability to me?
This vulnerability exists in cups-filters prior to version 1.28.18, specifically in the pdftoraster tool. An attacker can craft a PDF file with a very large MediaBox width value, which causes an integer overflow during the calculation of bytesPerLine. This overflow results in allocating a buffer smaller than needed. Subsequently, when the program writes pixel data, it writes beyond the allocated buffer size, causing an out-of-bounds write.