Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-0302

Опубликовано: 05 мар. 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 7.5

Описание

Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553.

РелизСтатусПримечание
dapper

DNE

devel

released

1.4.3-1
hardy

DNE

intrepid

released

1.3.9-2ubuntu9.5
jaunty

released

1.3.9-17ubuntu3.6
karmic

released

1.4.1-5ubuntu2.4
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

not-affected

code not present
devel

DNE

hardy

released

1.3.7-1ubuntu3.8
intrepid

DNE

jaunty

DNE

karmic

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 90%
0.0529
Низкий

4.3 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

redhat
больше 15 лет назад

Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553.

CVSS3: 7.5
nvd
больше 15 лет назад

Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553.

CVSS3: 7.5
debian
больше 15 лет назад

Use-after-free vulnerability in the abstract file-descriptor handling ...

CVSS3: 7.5
github
около 3 лет назад

Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553.

oracle-oval
больше 15 лет назад

ELSA-2010-0129: cups security update (MODERATE)

EPSS

Процентиль: 90%
0.0529
Низкий

4.3 Medium

CVSS2

7.5 High

CVSS3