Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by causing negative arguments to be fed into memcpy() calls via HTTP requests with (1) a negative Content-Length value or (2) a negative length in a chunked transfer encoding.
https://exchange.xforce.ibmcloud.com/vulnerabilities/10909
http://www.securityfocus.com/bid/6437
http://www.redhat.com/support/errata/RHSA-2002-295.html
http://www.novell.com/linux/security/advisories/2003_002_cups.html
http://www.mandriva.com/security/advisories?name=MDKSA-2003:001
http://www.debian.org/security/2003/dsa-232
http://secunia.com/advisories/9325/
http://secunia.com/advisories/8080/
http://secunia.com/advisories/7913/
http://secunia.com/advisories/7907
http://secunia.com/advisories/7858
http://secunia.com/advisories/7843
http://secunia.com/advisories/7803
http://secunia.com/advisories/7794
http://secunia.com/advisories/7756/
http://marc.info/?l=bugtraq&m=104032149026670&w=2
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000702
http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0117.html