First published: Thu Feb 21 2008(Updated: )
Double free vulnerability in the process_browse_data function in CUPS 1.3.5 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via crafted UDP Browse packets to the cupsd port (631/udp), related to an unspecified manipulation of a remote printer. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cups Cups | =1.3.5 | |
redhat/1.3.6 | <2. | 2. |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.