cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In versions 2.0.1 and prior, a heap-buffer-overflow vulnerability in the rastertopclx filter causes the program to crash with a segmentation fault when processing maliciously crafted input data. This issue can be exploited to trigger memory corruption, potentially leading to arbitrary code execution. This issue has been patched via commit 956283c.
History

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Openprinting
Openprinting libcupsfilters
Vendors & Products Openprinting
Openprinting libcupsfilters

Fri, 21 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 20 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

Thu, 20 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Description cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. In versions 2.0.1 and prior, a heap-buffer-overflow vulnerability in the rastertopclx filter causes the program to crash with a segmentation fault when processing maliciously crafted input data. This issue can be exploited to trigger memory corruption, potentially leading to arbitrary code execution. This issue has been patched via commit 956283c.
Title CUPS rastertopclx Filter Vulnerable to Heap Buffer Overflow Leading to Potential Arbitrary Code Execution
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-11-20T18:05:06.236Z

Updated: 2025-11-21T16:06:49.862Z

Reserved: 2025-11-05T21:15:39.401Z

Link: CVE-2025-64524

cve-icon Vulnrichment

Updated: 2025-11-20T19:03:06.343Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-20T18:15:51.250

Modified: 2025-11-21T17:15:51.643

Link: CVE-2025-64524

cve-icon Redhat

No data.