"CUPS is prone to multiple heap-based buffer-overflow vulnerabilities
because it fails to properly bounds-check user-supplied input before
copying it into a finite-sized buffer.
Exploiting these issues may allow remote attackers to execute arbitrary
code in the context of the affected application. Failed exploit attempts
will likely cause denial-of-service conditions."