Описание
The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | DNE | |
| devel | not-affected | 1.3.10-2 |
| hardy | DNE | |
| intrepid | released | 1.3.9-2ubuntu9.2 |
| jaunty | released | 1.3.9-17ubuntu3.1 |
| upstream | released | 1.3.10 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | released | 1.2.2-0ubuntu0.6.06.14 |
| devel | DNE | |
| hardy | released | 1.3.7-1ubuntu3.5 |
| intrepid | DNE | |
| jaunty | DNE | |
| upstream | needs-triage |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.
The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.
The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 do ...
The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.
EPSS
5 Medium
CVSS2
7.5 High
CVSS3