{"id":"UBUNTU-CVE-2015-1158","details":"The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2) IPP_PRINT_JOB request, as demonstrated by replacing the configuration file and consequently executing arbitrary code.","modified":"2026-02-04T02:20:13.283392Z","published":"2015-06-09T00:00:00Z","related":["USN-2629-1"],"upstream":["CVE-2015-1158"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-1158"},{"type":"REPORT","url":"http://www.kb.cert.org/vuls/id/810572"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2629-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2015-1158"}],"affected":[{"package":{"name":"cups","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/cups@1.7.2-0ubuntu1.6?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.7.2-0ubuntu1.6"}]}],"versions":["1.7.0~rc1-0ubuntu5","1.7.0-0ubuntu2","1.7.0-0ubuntu3","1.7.0-1","1.7.0-2","1.7.1-1","1.7.1-2","1.7.1-2git1","1.7.1-3","1.7.1-4","1.7.1-4ubuntu1","1.7.1-5ubuntu1","1.7.1-5ubuntu3","1.7.1-5ubuntu4","1.7.1-5ubuntu5","1.7.1-5ubuntu6","1.7.1-5ubuntu7","1.7.1-5ubuntu8","1.7.1-5ubuntu9","1.7.1-5ubuntu10","1.7.2-0ubuntu1","1.7.2-0ubuntu1.1","1.7.2-0ubuntu1.2","1.7.2-0ubuntu1.4","1.7.2-0ubuntu1.5"],"ecosystem_specific":{"binaries":[{"binary_name":"cups","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"cups-bsd","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"cups-client","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"cups-common","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"cups-core-drivers","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"cups-daemon","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"cups-ppdc","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"cups-server-common","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"libcups2","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"libcups2-dev","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"libcupscgi1","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"libcupscgi1-dev","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"libcupsimage2","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"libcupsimage2-dev","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"libcupsmime1","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"libcupsmime1-dev","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"libcupsppdc1","binary_version":"1.7.2-0ubuntu1.6"},{"binary_name":"libcupsppdc1-dev","binary_version":"1.7.2-0ubuntu1.6"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-1158.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"high"}]}