Anibal Sacco from Core Security Technologies discovered a NULL pointer dereference flaw in CUPS daemon when handling the IPP_TAG_UNSUPPORTED, which allows remote attackers with access to CUPS' IPP port to crash cupsd. Acknowledgements: Red Hat would like to thank Anibal Sacco from Core Security Technologies for reporting this issue.
Created attachment 344106 [details] Probable patch Extracted from upstream SVN, first appears in 1.3.10. svn diff -c 8409 http://svn.easysw.com/public/cups/branches/branch-1.3/
Public now via Core Security Technologies advisory: http://www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2009:1082 https://rhn.redhat.com/errata/RHSA-2009-1082.html
This issue has been addressed in following products: Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 4 Via RHSA-2009:1083 https://rhn.redhat.com/errata/RHSA-2009-1083.html