Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 01:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html - Mailing List | |
References | () http://secunia.com/advisories/37360 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/37364 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/38241 - Broken Link | |
References | () http://secunia.com/advisories/43521 - Broken Link | |
References | () http://security.gentoo.org/glsa/glsa-201207-10.xml - Third Party Advisory | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-66-275230-1 - Broken Link | |
References | () http://support.apple.com/kb/HT4004 - Vendor Advisory | |
References | () http://www.cups.org/newsgroups.php/newsgroups.php?v5994+gcups.bugs - Broken Link, Patch, Vendor Advisory | |
References | () http://www.cups.org/newsgroups.php/newsgroups.php?v5996+gcups.bugs - Broken Link, Patch, Vendor Advisory | |
References | () http://www.cups.org/newsgroups.php/newsgroups.php?v6055+gcups.bugs - Broken Link, Patch, Vendor Advisory | |
References | () http://www.cups.org/str.php?L3200 - Broken Link, Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2011/dsa-2176 - Mailing List | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:073 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2009-1595.html - Broken Link | |
References | () http://www.securityfocus.com/bid/37048 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-906-1 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0173 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2011/0535 - Broken Link | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=530111 - Issue Tracking | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11183 - Broken Link | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00332.html - Mailing List |
Information
Published : 2009-11-20 02:30
Updated : 2024-11-21 01:07
NVD link : CVE-2009-3553
Mitre link : CVE-2009-3553
CVE.ORG link : CVE-2009-3553
JSON object : View
Products Affected
debian
- debian_linux
apple
- mac_os_x_server
- cups
- mac_os_x
canonical
- ubuntu_linux
redhat
- enterprise_linux
fedoraproject
- fedora
CWE
CWE-416
Use After Free