First published: Fri May 15 2009(Updated: )
Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cups | <1:1.3.7-11.el5_4.4 | 1:1.3.7-11.el5_4.4 |
CUPS | =1.3.10 | |
CUPS | =1.3.7 | |
Apple iOS and macOS | <10.5.8 | |
Apple iOS and macOS | >=10.6.0<10.6.2 | |
Apple macOS Server | <10.5.8 | |
Apple macOS Server | >=10.6.0<10.6.2 | |
Fedora | =10 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Ubuntu | =9.04 | |
Ubuntu | =9.10 | |
Debian | =5.0 | |
Red Hat Enterprise Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3553 has a medium severity level due to its potential for denial of service.
To fix CVE-2009-3553, upgrade CUPS to version 1.3.11 or later, or apply the relevant security patches provided by your distribution.
CVE-2009-3553 affects CUPS versions 1.3.7 and 1.3.10, along with certain versions of macOS, Ubuntu, and Fedora.
CVE-2009-3553 can be exploited by remote attackers to cause a denial of service, crashing or hanging the CUPS daemon.
While CVE-2009-3553 is an older vulnerability, systems still using vulnerable versions of CUPS remain at risk.