First published: Wed Apr 22 2009(Updated: )
Swen van Brussel reported pointer use-after-delete flaw, present in the CUPS directory services routine, processing new data about available printers and printer classes. A remote attacker could suspend, and after a carefully-chosen time interval renew sending of CUPS browse packets to the victim machine with running cupsd daemon, leading to a denial of service (cupsd daemon stop or crash). Acknowledgements: Red Hat would like to thank Swen van Brussel for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-497135 is classified as high due to the potential for remote code execution.
To fix REDHAT-BUG-497135, update your Apple CUPS installation to the latest version that addresses this vulnerability.
The systems affected by REDHAT-BUG-497135 include those running Apple CUPS.
REDHAT-BUG-497135 is identified as a pointer use-after-delete flaw.
Yes, REDHAT-BUG-497135 can be exploited remotely by an attacker to disrupt services.