First published: Tue Feb 26 2008(Updated: )
Use-after-free vulnerability in CUPS before 1.1.22, and possibly other versions, allows remote attackers to cause a denial of service (crash) via crafted IPP packets.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Desktop-file-utils | =3.0 | |
Red Hat Desktop-file-utils | =4.0 | |
Red Hat Enterprise Linux | =as_3 | |
Red Hat Enterprise Linux | =as_4 | |
Red Hat Enterprise Linux | =es_3 | |
Red Hat Enterprise Linux | =es_4 | |
Red Hat Enterprise Linux | =ws_3 | |
Red Hat Enterprise Linux | =ws_4 | |
CUPS (Common UNIX Printing System) | =1.1.17 | |
CUPS (Common UNIX Printing System) | =1.1.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0597 is classified as a denial of service vulnerability due to its potential to crash the CUPS service.
To fix CVE-2008-0597, upgrade CUPS to version 1.1.22 or later.
CVE-2008-0597 affects systems running CUPS versions prior to 1.1.22.
Use-after-free in CVE-2008-0597 refers to the vulnerability where memory that has been freed can still be accessed, leading to crashes or unexpected behavior.
Yes, CVE-2008-0597 can be exploited remotely through crafted IPP packets.