First published: Wed Apr 22 2009(Updated: )
Swen van Brussel reported pointer use-after-delete flaw, present in the CUPS directory services routine, processing new data about available printers and printer classes. A remote attacker could suspend, and after a carefully-chosen time interval renew sending of CUPS browse packets to the victim machine with running cupsd daemon, leading to a denial of service (cupsd daemon stop or crash). Acknowledgements: Red Hat would like to thank Swen van Brussel for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS | =1.1.17 | |
CUPS | =1.1.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1196 is rated as having a moderate severity due to its potential exploitation by remote attackers.
To fix CVE-2009-1196, ensure you update CUPS to version 1.1.23 or later, which addresses this vulnerability.
CVE-2009-1196 affects CUPS versions 1.1.17 and 1.1.22, typically found on macOS and other Unix-like systems.
Yes, a successful exploit of CVE-2009-1196 can allow a remote attacker to cause a denial of service by sending crafted CUPS browse packets.
A use-after-delete vulnerability like CVE-2009-1196 occurs when a program continues to use a pointer after the memory it points to has been freed, potentially leading to unexpected behavior.