First published: Fri Jan 22 2010(Updated: )
Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cups | <1:1.3.7-11.el5_4.6 | 1:1.3.7-11.el5_4.6 |
CUPS | =1.3.9 | |
CUPS | =1.4.1 | |
CUPS | =1.3.10 | |
CUPS | =1.3.7 | |
CUPS | <1.4.4 | |
Apple iOS and macOS | <10.5.8 | |
Apple iOS and macOS | >=10.6.0<10.6.4 | |
Apple iOS and macOS | <10.5.8 | |
Apple iOS and macOS | >=10.6.0<10.6.4 | |
Red Hat Fedora | =11 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Ubuntu | =9.04 | |
Ubuntu | =9.10 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Server EUS | =5.4 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Workstation | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0302 is classified as a high severity vulnerability due to its potential to cause denial of service.
To mitigate CVE-2010-0302, upgrade to CUPS version 1.4.4 or later.
CVE-2010-0302 affects CUPS versions prior to 1.4.4, including 1.3.7 to 1.4.1.
The impact of CVE-2010-0302 is a denial of service that may crash or hang the CUPS daemon.
CVE-2010-0302 can be exploited by remote attackers who have access to connect to the CUPS service.