Vulnerability Details : CVE-2010-0302
Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS before 1.4.4, when kqueue or epoll is used, allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count. NOTE: some of these details are obtained from third party information. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3553.
Vulnerability category: Memory CorruptionDenial of service
Threat overview for CVE-2010-0302
Top countries where our scanners detected CVE-2010-0302
Top open port discovered on systems with this issue
631
IPs affected by CVE-2010-0302 46
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2010-0302!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2010-0302
Probability of exploitation activity in the next 30 days: 7.58%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 94 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-0302
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2010-0302
-
Assigned by: nvd@nist.gov (Primary)
-
Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-0302
-
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037174.html
[SECURITY] Fedora 11 Update: cups-1.4.2-26.fc11Mailing List
-
http://secunia.com/advisories/38927
Sign inBroken Link
-
http://secunia.com/advisories/38979
Sign inBroken Link
-
http://security.gentoo.org/glsa/glsa-201207-10.xml
CUPS: Multiple vulnerabilities (GLSA 201207-10) — Gentoo securityThird Party Advisory
-
http://secunia.com/advisories/38785
Sign inBroken Link
-
https://bugzilla.redhat.com/show_bug.cgi?id=557775
557775 – (CVE-2010-0302) CVE-2010-0302 cups Incomplete fix for CVE-2009-3553Issue Tracking;Patch
-
http://www.securityfocus.com/bid/38510
CUPS File Descriptors Handling Use-After-Free Remote Denial Of Service VulnerabilityBroken Link;Third Party Advisory;VDB Entry
-
http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html
Apple - Lists.apple.comMailing List
-
http://secunia.com/advisories/40220
Sign inBroken Link
-
http://cups.org/articles.php?L596
Page Has Moved - CUPS.orgRelease Notes
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11216
Repository / Oval RepositoryBroken Link
-
http://www.ubuntu.com/usn/USN-906-1
USN-906-1: CUPS vulnerabilities | Ubuntu security noticesThird Party Advisory
-
http://www.vupen.com/english/advisories/2010/1481
Webmail | OVH- OVHBroken Link
-
http://www.securitytracker.com/id?1024124
CUPS Use After Free in cupsdDoSelect() Lets Remote Users Deny Service - SecurityTrackerBroken Link;Third Party Advisory;VDB Entry
-
http://www.mandriva.com/security/advisories?name=MDVSA-2010:073
mandriva.comBroken Link
-
https://rhn.redhat.com/errata/RHSA-2010-0129.html
RHSA-2010:0129 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
http://support.apple.com/kb/HT4188
About the security content of Security Update 2010-004 / Mac OS X v10.6.4 - Apple SupportVendor Advisory
-
http://cups.org/str.php?L3490
CVE-2010-0302: Incomplete fix for CVE-2009-3553 (STR #3200) · Issue #3490 · apple/cups · GitHubRelease Notes
Products affected by CVE-2010-0302
- cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_eus:5.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
- cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*