CVE-2010-2941

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request.

References

http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox

http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.html

http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.html

http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html

http://rhn.redhat.com/errata/RHSA-2010-0811.html

http://secunia.com/advisories/42287

http://secunia.com/advisories/42867

http://secunia.com/advisories/43521

http://security.gentoo.org/glsa/glsa-201207-10.xml

http://securitytracker.com/id?1024662

http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.468323

http://support.apple.com/kb/HT4435

http://www.debian.org/security/2011/dsa-2176

http://www.mandriva.com/security/advisories?name=MDVSA-2010:232

http://www.mandriva.com/security/advisories?name=MDVSA-2010:233

http://www.mandriva.com/security/advisories?name=MDVSA-2010:234

http://www.osvdb.org/68951

http://www.redhat.com/support/errata/RHSA-2010-0866.html

http://www.securityfocus.com/bid/44530

http://www.ubuntu.com/usn/USN-1012-1

http://www.vupen.com/english/advisories/2010/2856

http://www.vupen.com/english/advisories/2010/3042

http://www.vupen.com/english/advisories/2010/3088

http://www.vupen.com/english/advisories/2011/0061

http://www.vupen.com/english/advisories/2011/0535

https://bugzilla.redhat.com/show_bug.cgi?id=624438

https://exchange.xforce.ibmcloud.com/vulnerabilities/62882

Details

Source: MITRE

Published: 2010-11-05

Updated: 2017-08-17

Type: CWE-399

Risk Information

CVSS v2

Base Score: 7.9

Vector: AV:A/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 5.5

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.4:b1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.4:b2:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.4:b3:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.4:rc1:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:1.4.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:* versions up to 1.4.4 (inclusive)

Tenable Plugins

View all (25 total)

IDNameProductFamilySeverity
75456openSUSE Security Update : cups (openSUSE-SU-2010:1018-1)NessusSuSE Local Security Checks
high
68140Oracle Linux 6 : cups (ELSA-2010-0866)NessusOracle Linux Local Security Checks
high
68130Oracle Linux 5 : cups (ELSA-2010-0811)NessusOracle Linux Local Security Checks
high
60888Scientific Linux Security Update : cups on SL6.x i386/x86_64NessusScientific Linux Local Security Checks
high
60881Scientific Linux Security Update : cups on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
high
59902GLSA-201207-10 : CUPS: Multiple vulnerabilitiesNessusGentoo Local Security Checks
high
53703openSUSE Security Update : cups (openSUSE-SU-2010:1018-1)NessusSuSE Local Security Checks
high
53654openSUSE Security Update : cups (openSUSE-SU-2010:1018-1)NessusSuSE Local Security Checks
high
52484Debian DSA-2176-1 : cups - several vulnerabilitiesNessusDebian Local Security Checks
high
50983SuSE 11 / 11.1 Security Update : CUPS (SAT Patch Numbers 3575 / 3576)NessusSuSE Local Security Checks
high
50844CUPS < 1.4.5 Multiple VulnerabilitiesNessusMisc.
critical
50832Slackware 12.0 / 12.1 / 12.2 / 13.0 / 13.1 / current : cups (SSA:2010-333-01)NessusSlackware Local Security Checks
high
50802CentOS 5 : cups (CESA-2010:0811)NessusCentOS Local Security Checks
high
50685Fedora 12 : cups-1.4.4-11.fc12 (2010-17627)NessusFedora Local Security Checks
high
50684Fedora 13 : cups-1.4.4-11.fc13 (2010-17615)NessusFedora Local Security Checks
high
50638RHEL 6 : cups (RHSA-2010:0866)NessusRed Hat Local Security Checks
high
50618Fedora 14 : cups-1.4.4-11.fc14 (2010-17641)NessusFedora Local Security Checks
high
50607Mandriva Linux Security Advisory : cups (MDVSA-2010:233)NessusMandriva Local Security Checks
high
50606Mandriva Linux Security Advisory : cups (MDVSA-2010:232)NessusMandriva Local Security Checks
high
800791Mac OS X 10.6 < 10.6.5 Multiple VulnerabilitiesLog Correlation EngineOperating System Detection
high
5705Mac OS X 10.6 < 10.6.5 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
50549Mac OS X Multiple Vulnerabilities (Security Update 2010-007)NessusMacOS X Local Security Checks
high
50548Mac OS X 10.6.x < 10.6.5 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
50490Ubuntu 6.06 LTS / 8.04 LTS / 9.10 / 10.04 LTS / 10.10 : cups, cupsys vulnerability (USN-1012-1)NessusUbuntu Local Security Checks
high
50407RHEL 5 : cups (RHSA-2010:0811)NessusRed Hat Local Security Checks
high