Bug 497135 (CVE-2009-1196) - CVE-2009-1196 cups: DoS (stop, crash) by renewing CUPS browse packets
Summary: CVE-2009-1196 cups: DoS (stop, crash) by renewing CUPS browse packets
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2009-1196
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 494547 498016 498017 498023
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-04-22 13:48 UTC by Jan Lieskovsky
Modified: 2023-05-11 13:35 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2009-06-16 07:06:23 UTC
Embargoed:


Attachments (Terms of Use)
Proposed patch by Tim Waugh. (6.65 KB, patch)
2009-04-22 14:09 UTC, Jan Lieskovsky
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2009:1083 0 normal SHIPPED_LIVE Important: cups security update 2009-06-03 15:50:54 UTC

Description Jan Lieskovsky 2009-04-22 13:48:53 UTC
Swen van Brussel reported pointer use-after-delete flaw, present in the CUPS directory services routine, processing new data about available printers and printer classes. A remote attacker could suspend, and after a carefully-chosen time interval renew sending of CUPS browse packets to the victim machine
with running cupsd daemon, leading to a denial of service (cupsd daemon
stop or crash).

Acknowledgements:

Red Hat would like to thank Swen van Brussel for reporting this issue.

Comment 13 errata-xmlrpc 2009-06-03 15:54:30 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3
  Red Hat Enterprise Linux 4

Via RHSA-2009:1083 https://rhn.redhat.com/errata/RHSA-2009-1083.html


Note You need to log in before you can comment on or make changes to this bug.