VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
CVE-2010-0542
cups: The _WriteProlog function in texttops.c in texttops...
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0542

Original

The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file.

Translation   (Show)





About This Analysis Information
Analysis Information Provider:
NIST NVD
First Published:
2010-06-21
Source Information Category:
Advisory, Alert
Last Updated:
2010-06-21




Affected Product Tags
cpe:/a:apple:cups:1.1
cpe:/a:apple:cups:1.1.1
cpe:/a:apple:cups:1.1.10
cpe:/a:apple:cups:1.1.10-1
cpe:/a:apple:cups:1.1.11
cpe:/a:apple:cups:1.1.12
cpe:/a:apple:cups:1.1.13
cpe:/a:apple:cups:1.1.14
cpe:/a:apple:cups:1.1.15
cpe:/a:apple:cups:1.1.16
cpe:/a:apple:cups:1.1.17
cpe:/a:apple:cups:1.1.18
cpe:/a:apple:cups:1.1.19
cpe:/a:apple:cups:1.1.19:rc1
cpe:/a:apple:cups:1.1.19:rc2
cpe:/a:apple:cups:1.1.19:rc3
cpe:/a:apple:cups:1.1.19:rc4
cpe:/a:apple:cups:1.1.19:rc5
cpe:/a:apple:cups:1.1.2
cpe:/a:apple:cups:1.1.20
cpe:/a:apple:cups:1.1.20:rc1
cpe:/a:apple:cups:1.1.20:rc2
cpe:/a:apple:cups:1.1.20:rc3
cpe:/a:apple:cups:1.1.20:rc4
cpe:/a:apple:cups:1.1.20:rc5
cpe:/a:apple:cups:1.1.20:rc6
cpe:/a:apple:cups:1.1.21
cpe:/a:apple:cups:1.1.21:rc1
cpe:/a:apple:cups:1.1.21:rc2
cpe:/a:apple:cups:1.1.22
cpe:/a:apple:cups:1.1.22:rc1
cpe:/a:apple:cups:1.1.22:rc2
cpe:/a:apple:cups:1.1.23
cpe:/a:apple:cups:1.1.23:rc1
cpe:/a:apple:cups:1.1.3
cpe:/a:apple:cups:1.1.4
cpe:/a:apple:cups:1.1.5
cpe:/a:apple:cups:1.1.5-1
cpe:/a:apple:cups:1.1.5-2
cpe:/a:apple:cups:1.1.6
cpe:/a:apple:cups:1.1.6-1
cpe:/a:apple:cups:1.1.6-2
cpe:/a:apple:cups:1.1.6-3
cpe:/a:apple:cups:1.1.7
cpe:/a:apple:cups:1.1.8
cpe:/a:apple:cups:1.1.9
cpe:/a:apple:cups:1.1.9-1
cpe:/a:apple:cups:1.2.0
cpe:/a:apple:cups:1.2.1
cpe:/a:apple:cups:1.2.10
cpe:/a:apple:cups:1.2.11
cpe:/a:apple:cups:1.2.12
cpe:/a:apple:cups:1.2.2
cpe:/a:apple:cups:1.2.3
cpe:/a:apple:cups:1.2.4
cpe:/a:apple:cups:1.2.5
cpe:/a:apple:cups:1.2.6
cpe:/a:apple:cups:1.2.7
cpe:/a:apple:cups:1.2.8
cpe:/a:apple:cups:1.2.9
cpe:/a:apple:cups:1.2:b1
cpe:/a:apple:cups:1.2:b2
cpe:/a:apple:cups:1.2:rc1
cpe:/a:apple:cups:1.2:rc2
cpe:/a:apple:cups:1.2:rc3
cpe:/a:apple:cups:1.3.0
cpe:/a:apple:cups:1.3.1
cpe:/a:apple:cups:1.3.10
cpe:/a:apple:cups:1.3.11
cpe:/a:apple:cups:1.3.2
cpe:/a:apple:cups:1.3.3
cpe:/a:apple:cups:1.3.4
cpe:/a:apple:cups:1.3.5
cpe:/a:apple:cups:1.3.6
cpe:/a:apple:cups:1.3.7
cpe:/a:apple:cups:1.3.8
cpe:/a:apple:cups:1.3.9
cpe:/a:apple:cups:1.3:b1
cpe:/a:apple:cups:1.3:rc1
cpe:/a:apple:cups:1.3:rc2
cpe:/a:apple:cups:1.4.0
cpe:/a:apple:cups:1.4.1
cpe:/a:apple:cups:1.4.2
cpe:/a:apple:cups:1.4.3 and previous versions
 


Vulnerability Analysis Results
[Access Vector]  [?]
Undefined [?]

Local [?]
Adjacent Network [?]
X Network [?]

[Access Complexit]  [?]
Undefined [?]

High [?]
X Medium [?]
Low [?]

[Authentication]  [?]
Undefined [?]

Multiple [?]
Single [?]
X None [?]

[Confidentiality Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Integrity Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

[Availability Impact]  [?]
Undefined [?]

None [?]
X Partial [?]
Complete [?]

Alternatives




References
BID 40943




CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=587746




CONFIRM http://cups.org/strfiles/3516/str3516.patch




CONFIRM http://cups.org/articles.php?L596




CONFIRM http://cups.org/str.php?L3516




SECTRACK 1024121




Vulnerability Type Permissions, Privileges, and Access Control (CWE-264)





Copyright © 2010 JPCERT/CC All Rights Reserved.