The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2018/05/msg00018.html | mailing list |
https://github.com/apple/cups/issues/5143 | third party advisory exploit |
https://lists.debian.org/debian-lts-announce/2018/07/msg00003.html | mailing list |
https://usn.ubuntu.com/3713-1/ | vendor advisory |
https://security.cucumberlinux.com/security/details.php?id=346 | third party advisory exploit |
https://github.com/apple/cups/releases/tag/v2.2.6 | third party advisory |
https://github.com/apple/cups/commit/49fa4983f25b64ec29d548ffa3b9782426007df3 | third party advisory patch |