CVE-2008-0882

Publication date 21 February 2008

Last updated 24 July 2024


Ubuntu priority

Double free vulnerability in the process_browse_data function in CUPS 1.3.5 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via crafted UDP Browse packets to the cupsd port (631/udp), related to an unspecified manipulation of a remote printer. NOTE: some of these details are obtained from third party information.

Status

Package Ubuntu Release Status
cupsys 7.10 gutsy
Fixed 1.3.2-1ubuntu7.6
7.04 feisty
Fixed 1.2.8-0ubuntu8.3
6.10 edgy
Fixed 1.2.4-2ubuntu3.3
6.06 LTS dapper
Fixed 1.2.2-0ubuntu0.6.06.8

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
cupsys

References

Related Ubuntu Security Notices (USN)

    • USN-598-1
    • CUPS vulnerabilities
    • 2 April 2008

Other references