{"id":"CVE-2023-32324","summary":"OpenPrinting CUPS vulnerable to heap buffer overflow","details":"OpenPrinting CUPS is an open source printing system. In versions 2.4.2 and prior, a heap buffer overflow vulnerability would allow a remote attacker to launch a denial of service (DoS) attack. A buffer overflow vulnerability in the function `format_log_line` could allow remote attackers to cause a DoS on the affected system. Exploitation of the vulnerability can be triggered when the configuration file `cupsd.conf` sets the value of `loglevel `to `DEBUG`. No known patches or workarounds exist at time of publication.","aliases":["GHSA-cxc6-w2g7-69p7"],"modified":"2026-04-16T04:31:37.439462508Z","published":"2023-06-01T16:04:10.994Z","related":["ALSA-2023:6596","ALSA-2023:7165","CGA-ghcq-gcg7-3pg5","SUSE-SU-2023:2346-1","SUSE-SU-2023:2347-1","SUSE-SU-2025:20090-1","openSUSE-SU-2024:12975-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/32xxx/CVE-2023-32324.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-122","CWE-787"]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/32xxx/CVE-2023-32324.json"},{"type":"ADVISORY","url":"https://github.com/OpenPrinting/cups/security/advisories/GHSA-cxc6-w2g7-69p7"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32324"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openprinting/cups","events":[{"introduced":"0"},{"last_affected":"12ff481989924fc82ffdf1b8699753a486a33547"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.4.2"}]}}],"versions":["v2.2.0","v2.2.1","v2.2.2","v2.2.3","v2.2.4","v2.2.5","v2.2.6","v2.2b1","v2.2b2","v2.2rc1","v2.3.0","v2.3.1","v2.3.3","v2.3.3op1","v2.3.3op2","v2.3b1","v2.3b2","v2.3b3","v2.3b4","v2.3b5","v2.3b6","v2.3b7","v2.3b8","v2.3rc1","v2.4.0","v2.4.1","v2.4.2","v2.4b1","v2.4rc1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32324.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}