CVE-2008-5183
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
21/11/2008
Last modified:
09/04/2025
Description
cupsd in CUPS 1.3.9 and earlier allows local users, and possibly remote attackers, to cause a denial of service (daemon crash) by adding a large number of RSS Subscriptions, which triggers a NULL pointer dereference. NOTE: this issue can be triggered remotely by leveraging CVE-2008-5184.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:* | 1.3.9 (including) | |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | 10.5.6 (excluding) | |
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* | 10.5.6 (excluding) | |
cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lab.gnucitizen.org/projects/cups-0day
- http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
- http://secunia.com/advisories/33937
- http://secunia.com/advisories/43521
- http://support.apple.com/kb/HT3438
- http://www.debian.org/security/2011/dsa-2176
- http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A028
- http://www.openwall.com/lists/oss-security/2008/11/19/3
- http://www.openwall.com/lists/oss-security/2008/11/19/4
- http://www.openwall.com/lists/oss-security/2008/11/20/1
- http://www.redhat.com/support/errata/RHSA-2008-1029.html
- http://www.securityfocus.com/bid/32419
- http://www.securitytracker.com/id?1021396=
- http://www.vupen.com/english/advisories/2009/0422
- http://www.vupen.com/english/advisories/2011/0535
- https://bugs.launchpad.net/ubuntu/+source/cups/+bug/298241
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46684
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10586
- https://www.exploit-db.com/exploits/7150
- http://lab.gnucitizen.org/projects/cups-0day
- http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
- http://secunia.com/advisories/33937
- http://secunia.com/advisories/43521
- http://support.apple.com/kb/HT3438
- http://www.debian.org/security/2011/dsa-2176
- http://www.gnucitizen.org/blog/pwning-ubuntu-via-cups/
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A028
- http://www.openwall.com/lists/oss-security/2008/11/19/3
- http://www.openwall.com/lists/oss-security/2008/11/19/4
- http://www.openwall.com/lists/oss-security/2008/11/20/1
- http://www.redhat.com/support/errata/RHSA-2008-1029.html
- http://www.securityfocus.com/bid/32419
- http://www.securitytracker.com/id?1021396=
- http://www.vupen.com/english/advisories/2009/0422
- http://www.vupen.com/english/advisories/2011/0535
- https://bugs.launchpad.net/ubuntu/+source/cups/+bug/298241
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46684
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10586
- https://www.exploit-db.com/exploits/7150