The directory-services functionality in the scheduler in CUPS 1.1.17 and 1.1.22 allows remote attackers to cause a denial of service (cupsd daemon outage or crash) via manipulations of the timing of CUPS browse packets, related to a "pointer use-after-delete flaw."
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://secunia.com/advisories/35340 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2009/1488 | vdb entry vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/50944 | vdb entry |
http://securitytracker.com/id?1022327 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=497135 | patch |
http://www.securityfocus.com/bid/35194 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11217 | vdb entry signature |
http://www.redhat.com/support/errata/RHSA-2009-1083.html | vendor advisory |