To exploit this flaw an attacker needs to print a malicious file through the vulnerable filter (either themselves or by convincing a victim to do so), it should therefore be AC:M
In CUPS, print filters run as an unprivileged user no superuser (root), therefore this should be scored C:P, I:P, A:P
CVSS v2 metrics
|Access Vector||Adjacent Network|
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
CVE description copyright © 2017, The MITRE Corporation