Critical severity9.8NVD Advisory· Published Nov 5, 2010· Updated Apr 29, 2026
CVE-2010-2941
CVE-2010-2941
Description
ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request.
Affected products
24cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*+ 4 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise:11.0:sp1:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
29- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatch
- rhn.redhat.com/errata/RHSA-2010-0811.htmlnvdThird Party Advisory
- security.gentoo.org/glsa/glsa-201207-10.xmlnvdThird Party Advisory
- securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- www.debian.org/security/2011/dsa-2176nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/44530nvdBroken LinkThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-1012-1nvdThird Party Advisory
- www.vupen.com/english/advisories/2010/2856nvdBroken LinkVendor Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/62882nvdThird Party AdvisoryVDB Entry
- blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefoxnvdBroken Link
- lists.apple.com/archives/security-announce/2010//Nov/msg00000.htmlnvdMailing List
- lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.htmlnvdMailing List
- lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.htmlnvdMailing List
- lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.htmlnvdMailing List
- lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.htmlnvdMailing List
- secunia.com/advisories/42287nvdBroken Link
- secunia.com/advisories/42867nvdBroken Link
- secunia.com/advisories/43521nvdBroken Link
- slackware.com/security/viewer.phpnvdBroken Link
- support.apple.com/kb/HT4435nvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.osvdb.org/68951nvdBroken Link
- www.redhat.com/support/errata/RHSA-2010-0866.htmlnvdBroken Link
- www.vupen.com/english/advisories/2010/3042nvdBroken Link
- www.vupen.com/english/advisories/2010/3088nvdBroken Link
- www.vupen.com/english/advisories/2011/0061nvdBroken Link
- www.vupen.com/english/advisories/2011/0535nvdBroken Link
News mentions
0No linked articles in our index yet.