APP: Apple CUPS cupsdDoSelect Remote Code Execution

This signature detects attempts to exploit a known code execution vulnerability in Apple CUPS. It is due to a use-after-free error within cupsdDoSelect function. Remote attackers can exploit this vulnerability by sending a malicious request to the target. A successful attack can allow arbitrary code execution.

Extended Description

CUPS is prone to a denial-of-service vulnerability. A remote attacker can exploit this issue to crash the affected application, denying service to legitimate users. This issue affects CUPS 1.3.7; other versions may be vulnerable as well.

Affected Products

Pardus linux_2009

References

BugTraq: 37048

CVE: CVE-2009-3553

Short Name
APP:CUPS:APPLE-DOSELECT
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Apple CUPS CVE-2009-3553 Code Execution Remote bid:37048 cupsdDoSelect
Release Date
10/13/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
Port
tcp/631
False Positive
Unknown
Vendors

Red_hat

Suse

Apple

Gentoo

Sun

Avaya

Easy_software_products

Pardus

Mandriva

Debian

CVSS Score

5.0

Found a potential security threat?