Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 01:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html - Mailing List | |
References | () http://secunia.com/advisories/37360 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/37364 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/38241 - Broken Link | |
References | () http://secunia.com/advisories/43521 - Broken Link | |
References | () http://security.gentoo.org/glsa/glsa-201207-10.xml - Third Party Advisory | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-66-275230-1 - Broken Link | |
References | () http://support.apple.com/kb/HT4004 - Vendor Advisory | |
References | () http://www.cups.org/newsgroups.php/newsgroups.php?v5994+gcups.bugs - Broken Link, Patch, Vendor Advisory | |
References | () http://www.cups.org/newsgroups.php/newsgroups.php?v5996+gcups.bugs - Broken Link, Patch, Vendor Advisory | |
References | () http://www.cups.org/newsgroups.php/newsgroups.php?v6055+gcups.bugs - Broken Link, Patch, Vendor Advisory | |
References | () http://www.cups.org/str.php?L3200 - Broken Link, Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2011/dsa-2176 - Mailing List | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2010:073 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2009-1595.html - Broken Link | |
References | () http://www.securityfocus.com/bid/37048 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-906-1 - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2010/0173 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2011/0535 - Broken Link | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=530111 - Issue Tracking | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11183 - Broken Link | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00332.html - Mailing List |
02 Feb 2024, 16:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:* |
|
First Time |
Canonical
Canonical ubuntu Linux Debian debian Linux Debian Redhat Fedoraproject fedora Apple mac Os X Redhat enterprise Linux Fedoraproject Apple mac Os X Server |
|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CWE | CWE-416 | |
References | (SECUNIA) http://secunia.com/advisories/37360 - Broken Link, Vendor Advisory | |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-201207-10.xml - Third Party Advisory | |
References | (MISC) http://www.cups.org/newsgroups.php/newsgroups.php?v5996+gcups.bugs - Broken Link, Patch, Vendor Advisory | |
References | (BID) http://www.securityfocus.com/bid/37048 - Broken Link, Third Party Advisory, VDB Entry | |
References | (MISC) http://www.cups.org/newsgroups.php/newsgroups.php?v5994+gcups.bugs - Broken Link, Patch, Vendor Advisory | |
References | (MISC) http://www.cups.org/str.php?L3200 - Broken Link, Patch, Vendor Advisory | |
References | (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00332.html - Mailing List | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2009-1595.html - Broken Link | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=530111 - Issue Tracking | |
References | (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-66-275230-1 - Broken Link | |
References | (APPLE) http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html - Mailing List | |
References | (MISC) http://www.cups.org/newsgroups.php/newsgroups.php?v6055+gcups.bugs - Broken Link, Patch, Vendor Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2011/0535 - Broken Link | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-906-1 - Third Party Advisory | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2010:073 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/37364 - Broken Link, Vendor Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/0173 - Broken Link | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11183 - Broken Link | |
References | (CONFIRM) http://support.apple.com/kb/HT4004 - Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/43521 - Broken Link | |
References | (DEBIAN) http://www.debian.org/security/2011/dsa-2176 - Mailing List | |
References | (SECUNIA) http://secunia.com/advisories/38241 - Broken Link |
07 Nov 2023, 02:04
Type | Values Removed | Values Added |
---|---|---|
Summary | Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. |
Information
Published : 2009-11-20 02:30
Updated : 2024-11-21 01:07
NVD link : CVE-2009-3553
Mitre link : CVE-2009-3553
CVE.ORG link : CVE-2009-3553
JSON object : View
Products Affected
apple
- mac_os_x
- cups
- mac_os_x_server
redhat
- enterprise_linux
canonical
- ubuntu_linux
debian
- debian_linux
fedoraproject
- fedora
CWE
CWE-416
Use After Free