{"id":"CVE-2013-6474","details":"Heap-based buffer overflow in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows remote attackers to execute arbitrary code via a crafted PDF file.","modified":"2026-04-16T01:38:15.276245206Z","published":"2014-03-14T15:55:05Z","withdrawn":"2026-01-27T04:13:12.040131Z","related":["openSUSE-SU-2024:10313-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-2875"},{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-2876"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2143-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2144-1"},{"type":"FIX","url":"http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7176"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1027548"},{"type":"WEB","url":"http://www.securityfocus.com/bid/66163"}],"schema_version":"1.7.3"}