{"id":"CVE-2013-6475","details":"Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.","modified":"2026-02-04T03:16:52.624326Z","published":"2014-03-14T15:55:05Z","related":["MGASA-2014-0170","openSUSE-SU-2024:10313-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-2875"},{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-2876"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2143-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2144-1"},{"type":"FIX","url":"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1027550"},{"type":"WEB","url":"http://www.securityfocus.com/bid/66166"}],"schema_version":"1.7.3"}