First published: Mon Aug 16 2010(Updated: )
Emmanuel Bouillon reported a memory corruption flaw in CUPS daemon. A specially-crafted IPP request can cause daemon to crash or, possibly, execute arbitrary code. Acknowledgements: Red Hat would like to thank Emmanuel Bouillon of NATO C3 Agency for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS | <=1.4.4 | |
macOS Yosemite | <10.5.8 | |
macOS Yosemite | >=10.6.0<=10.6.4 | |
Apple Mac OS X Server | <10.5.8 | |
Apple Mac OS X Server | >=10.6.0<=10.6.4 | |
Fedoraproject Fedora | =12 | |
Fedoraproject Fedora | =13 | |
Fedoraproject Fedora | =14 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =9.10 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
Debian GNU/Linux | =5.0 | |
openSUSE | =11.1 | |
openSUSE | =11.2 | |
openSUSE | =11.3 | |
SUSE Linux Enterprise Server | =10.0-sp3 | |
SUSE Linux Enterprise Server | =11.0 | |
SUSE Linux Enterprise Server | =11.0-sp1 | |
SUSE Linux Enterprise Server | =9 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux workstation | =5.0 | |
CUPS | =1.1 | |
CUPS | =1.1.1 | |
CUPS | =1.1.2 | |
CUPS | =1.1.3 | |
CUPS | =1.1.4 | |
CUPS | =1.1.5 | |
CUPS | =1.1.5-1 | |
CUPS | =1.1.5-2 | |
CUPS | =1.1.6 | |
CUPS | =1.1.6-1 | |
CUPS | =1.1.6-2 | |
CUPS | =1.1.6-3 | |
CUPS | =1.1.7 | |
CUPS | =1.1.8 | |
CUPS | =1.1.9 | |
CUPS | =1.1.9-1 | |
CUPS | =1.1.10 | |
CUPS | =1.1.10-1 | |
CUPS | =1.1.11 | |
CUPS | =1.1.12 | |
CUPS | =1.1.13 | |
CUPS | =1.1.14 | |
CUPS | =1.1.15 | |
CUPS | =1.1.16 | |
CUPS | =1.1.17 | |
CUPS | =1.1.18 | |
CUPS | =1.1.19 | |
CUPS | =1.1.19-rc1 | |
CUPS | =1.1.19-rc2 | |
CUPS | =1.1.19-rc3 | |
CUPS | =1.1.19-rc4 | |
CUPS | =1.1.19-rc5 | |
CUPS | =1.1.20 | |
CUPS | =1.1.20-rc1 | |
CUPS | =1.1.20-rc2 | |
CUPS | =1.1.20-rc3 | |
CUPS | =1.1.20-rc4 | |
CUPS | =1.1.20-rc5 | |
CUPS | =1.1.20-rc6 | |
CUPS | =1.1.21 | |
CUPS | =1.1.21-rc1 | |
CUPS | =1.1.21-rc2 | |
CUPS | =1.1.22 | |
CUPS | =1.1.22-rc1 | |
CUPS | =1.1.22-rc2 | |
CUPS | =1.1.23 | |
CUPS | =1.1.23-rc1 | |
CUPS | =1.2-b1 | |
CUPS | =1.2-b2 | |
CUPS | =1.2-rc1 | |
CUPS | =1.2-rc2 | |
CUPS | =1.2-rc3 | |
CUPS | =1.2.0 | |
CUPS | =1.2.1 | |
CUPS | =1.2.2 | |
CUPS | =1.2.3 | |
CUPS | =1.2.4 | |
CUPS | =1.2.5 | |
CUPS | =1.2.6 | |
CUPS | =1.2.7 | |
CUPS | =1.2.8 | |
CUPS | =1.2.9 | |
CUPS | =1.2.10 | |
CUPS | =1.2.11 | |
CUPS | =1.2.12 | |
CUPS | =1.3-b1 | |
CUPS | =1.3-rc1 | |
CUPS | =1.3-rc2 | |
CUPS | =1.3.0 | |
CUPS | =1.3.1 | |
CUPS | =1.3.2 | |
CUPS | =1.3.3 | |
CUPS | =1.3.4 | |
CUPS | =1.3.5 | |
CUPS | =1.3.6 | |
CUPS | =1.3.7 | |
CUPS | =1.3.8 | |
CUPS | =1.3.9 | |
CUPS | =1.3.10 | |
CUPS | =1.3.11 | |
CUPS | =1.4-b1 | |
CUPS | =1.4-b2 | |
CUPS | =1.4-b3 | |
CUPS | =1.4-rc1 | |
CUPS | =1.4.0 | |
CUPS | =1.4.1 | |
CUPS | =1.4.2 | |
CUPS | =1.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2941 has a CVSS base score of 7.5, indicating a high severity level due to its potential for remote code execution.
To mitigate CVE-2010-2941, upgrade to a patched version of CUPS that addresses the memory corruption flaw.
CVE-2010-2941 affects multiple CUPS versions, including 1.1.20, 1.4-b1, 1.1.5-2, among others.
Yes, an attacker can exploit CVE-2010-2941 remotely by sending a specially-crafted IPP request to the CUPS daemon.
The impacts of CVE-2010-2941 include crashing the CUPS daemon and potentially allowing an attacker to execute arbitrary code.