Vulnerability Description
Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Cups | < 1.4.4 |
| Apple | Mac Os X | < 10.5.8 |
| Apple | Mac Os X Server | < 10.5.8 |
| Fedoraproject | Fedora | 11 |
| Canonical | Ubuntu Linux | 6.06 |
| Redhat | Enterprise Linux | 5.0 |
| Redhat | Enterprise Linux Desktop | 5.0 |
| Redhat | Enterprise Linux Eus | 5.4 |
| Redhat | Enterprise Linux Server | 5.0 |
| Redhat | Enterprise Linux Workstation | 5.0 |
Related Weaknesses (CWE)
References
- http://cups.org/articles.php?L596Release Notes
- http://cups.org/str.php?L3490Release Notes
- http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.htmlMailing List
- http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037174.htmlMailing List
- http://secunia.com/advisories/38785Broken Link
- http://secunia.com/advisories/38927Broken Link
- http://secunia.com/advisories/38979Broken Link
- http://secunia.com/advisories/40220Broken Link
- http://security.gentoo.org/glsa/glsa-201207-10.xmlThird Party Advisory
- http://support.apple.com/kb/HT4188Vendor Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:073Broken Link
- http://www.securityfocus.com/bid/38510Broken LinkThird Party AdvisoryVDB Entry
- http://www.securitytracker.com/id?1024124Broken LinkThird Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-906-1Third Party Advisory
- http://www.vupen.com/english/advisories/2010/1481Broken Link
FAQ
What is CVE-2010-0302?
CVE-2010-0302 is a vulnerability with a CVSS score of 7.5 (HIGH). Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll...
How severe is CVE-2010-0302?
CVE-2010-0302 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-0302?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Cups, Apple Mac Os X, Apple Mac Os X Server, Fedoraproject Fedora, Canonical Ubuntu Linux.