Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2010-03-05 19:30
Updated : 2024-02-03 02:22
NVD link : CVE-2010-0302
Mitre link : CVE-2010-0302
CVE.ORG link : CVE-2010-0302
JSON object : View
Products Affected
apple
- mac_os_x_server
- cups
- mac_os_x
canonical
- ubuntu_linux
redhat
- enterprise_linux_eus
- enterprise_linux_workstation
- enterprise_linux_server
- enterprise_linux
- enterprise_linux_desktop
fedoraproject
- fedora
CWE
CWE-416
Use After Free