Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS prior to 1.4.4, when kqueue or epoll is used, allows remote malicious users to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apple mac os x server |
||
apple mac os x |
||
apple cups |
||
fedoraproject fedora 11 |
||
canonical ubuntu linux 9.04 |
||
canonical ubuntu linux 8.10 |
||
canonical ubuntu linux 9.10 |
||
canonical ubuntu linux 8.04 |
||
canonical ubuntu linux 6.06 |
||
redhat enterprise linux server 5.0 |
||
redhat enterprise linux workstation 5.0 |
||
redhat enterprise linux 5.0 |
||
redhat enterprise linux desktop 5.0 |
||
redhat enterprise linux eus 5.4 |