CVE-2009-3553
Published: November 20, 2009Last modified: November 10, 2023
Description
Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack Vector | NETWORK |
Attack complexity | LOW |
Privileges required | NONE |
User interaction | NONE |
Scope | UNCHANGED |
Confidentiality | NONE |
Integrity impact | NONE |
Availability impact | HIGH |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | cups | Not affected (2.4.2-r4) |
Stream | cups | Not affected (2.4.6-r0) |
References
- http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html
- http://secunia.com/advisories/37360
- http://secunia.com/advisories/37364
- http://secunia.com/advisories/38241
- http://secunia.com/advisories/43521
- http://security.gentoo.org/glsa/glsa-201207-10.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-275230-1
- http://support.apple.com/kb/HT4004
- http://www.cups.org/newsgroups.php/newsgroups.php?v5994+gcups.bugs
- http://www.cups.org/newsgroups.php/newsgroups.php?v5996+gcups.bugs
- http://www.cups.org/newsgroups.php/newsgroups.php?v6055+gcups.bugs
- http://www.cups.org/str.php?L3200
- http://www.debian.org/security/2011/dsa-2176
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:073
- http://www.redhat.com/support/errata/RHSA-2009-1595.html
- http://www.securityfocus.com/bid/37048
- http://www.ubuntu.com/usn/USN-906-1
- http://www.vupen.com/english/advisories/2010/0173
- http://www.vupen.com/english/advisories/2011/0535
- https://bugzilla.redhat.com/show_bug.cgi?id=530111
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11183
- https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00332.html