exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 1 of 1 RSS Feed

Files

Mandriva Linux Security Advisory 2010-073
Posted Apr 15, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-073 - CUPS in does not properly handle (1) HTTP headers and (2) HTML templates, which allows remote attackers to conduct cross-site scripting (XSS) attacks and HTTP response splitting attacks via vectors related to (a) the product's web interface, (b) the configuration of the print system, and (c) the titles of printed jobs. Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7, 1.3.9, 1.3.10, and 1.4.1, when kqueue or epoll is used, allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553. The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable to determine the file that provides localized message strings, which allows local users to gain privileges via a file that contains crafted localization data with format string specifiers. The updated packages have been patched to correct these issues. Packages for Mandriva Linux 2010.0 was missing with MDVSA-2010:073. This advisory provides packages for 2010.0 as well.

tags | advisory, remote, web, denial of service, local, xss
systems | linux, mandriva
advisories | CVE-2009-2820, CVE-2009-3553, CVE-2010-0302, CVE-2010-0393
SHA-256 | 8bc79655fa60e411cb4fc6c4176a462670c99e50077d17a036d4c694df5c95cf
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
China Is Digging A Big Frickin' Hole 33,000 Feet Into The Earth
Posted Jun 2, 2023

tags | headline, government, china, science
Researchers Tell Owners To Assume Compromise Of Unpatched Zyxel Firewalls
Posted Jun 1, 2023

tags | headline, hacker, flaw, backdoor
War Crimes Evidence Erased By Social Media Firms
Posted Jun 1, 2023

tags | headline, government, data loss, cyberwar, social, military
New Vulnerability Gives MacOS Users A Migraine
Posted Jun 1, 2023

tags | headline, flaw, apple
Amazon To Pay $30.8M For Alexa And Ring Privacy Violations
Posted Jun 1, 2023

tags | headline, government, privacy, usa, amazon, data loss
Russia Says U.S. Accessed Thousands Of Apple Phones In Spy Plot
Posted Jun 1, 2023

tags | headline, government, usa, phone, russia, cyberwar, spyware, apple
Organizations Warned Of Backdoor In Hundreds Of Gigabyte Motherboards
Posted May 31, 2023

tags | headline, hacker, microsoft, flaw, backdoor
XFS Bug In Linux Kernel 6.3.3 Coincides With SGI Code Comebank
Posted May 31, 2023

tags | headline, linux, flaw
Cyberwar Manufacturers Plot To Stay On Right Side Of US
Posted May 31, 2023

tags | headline, government, malware, usa, cyberwar, spyware
Critical Barracuda 0-Day Was Used To Backdoor Networks For 8 Months
Posted May 31, 2023

tags | headline, hacker, data loss, flaw, backdoor
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close