First published: Tue Feb 26 2008(Updated: )
Memory leak in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (memory consumption and daemon crash) via a large number of requests to add and remove shared printers.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Desktop | =3.0 | |
Red Hat Desktop | =4.0 | |
Red Hat Enterprise Linux | =as_3 | |
Red Hat Enterprise Linux | =as_4 | |
Red Hat Enterprise Linux | =es_3 | |
Red Hat Enterprise Linux | =es_4 | |
Red Hat Enterprise Linux | =ws_3 | |
Red Hat Enterprise Linux | =ws_4 | |
CUPS (Common UNIX Printing System) | =1.1.17 | |
CUPS (Common UNIX Printing System) | =1.1.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0596 has a high severity rating due to the potential for remote denial of service attacks.
To fix CVE-2008-0596, upgrade CUPS to version 1.1.22 or later, which addresses the memory leak issue.
CVE-2008-0596 affects CUPS versions prior to 1.1.22, particularly in various Red Hat Enterprise Linux and Red Hat Desktop versions.
CVE-2008-0596 exploits a memory leak vulnerability in CUPS that can lead to daemon crashes via excessive requests.
Yes, CVE-2008-0596 can be exploited remotely by attackers sending a large number of requests to manipulate shared printers.