Bug 433825 (CVE-2008-0596) - CVE-2008-0596 cups: memory leak handling IPP browse requests
Summary: CVE-2008-0596 cups: memory leak handling IPP browse requests
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-0596
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 433827 433828 433829
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-02-21 16:44 UTC by Mark J. Cox
Modified: 2019-09-29 12:23 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2008-02-25 14:34:10 UTC
Embargoed:


Attachments (Terms of Use)
Patch as used in Red Hat Enterprise Linux 4 CUPS packages based on upstream 1.1.22rc1 (2.66 KB, patch)
2008-07-28 07:05 UTC, Tomas Hoger
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0153 0 normal SHIPPED_LIVE Important: cups security update 2008-02-25 14:08:58 UTC
Red Hat Product Errata RHSA-2008:0161 0 normal SHIPPED_LIVE Important: cups security update 2008-02-25 14:08:58 UTC

Description Mark J. Cox 2008-02-21 16:44:05 UTC
Whilst investigating a double-free issue in process_browse_data (Bug #433758) we
discovered that older versions of CUPS as shipped with Enterprise Linux 3 and 4
did not free the mime type allocated when a remote resource timed out.

A malicious user on the local subnet could send carefully crafted IPP packets to
the udp port in such a way as to consume memory and lead to a CUPS crash.

Comment 3 Tomas Hoger 2008-02-25 13:12:58 UTC
Lifting embargo.

Comment 4 Red Hat Product Security 2008-02-25 14:34:10 UTC
This issue was addressed in:

Red Hat Enterprise Linux:
  http://rhn.redhat.com/errata/RHSA-2008-0153.html
  http://rhn.redhat.com/errata/RHSA-2008-0161.html



Comment 5 Tomas Hoger 2008-07-28 07:05:26 UTC
Created attachment 312752 [details]
Patch as used in Red Hat Enterprise Linux 4 CUPS packages based on upstream 1.1.22rc1


Note You need to log in before you can comment on or make changes to this bug.