Description
The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstrated by the (1) /admin?OP=redirect&URL=% and (2) /admin?URL=/admin/&OP=% URIs.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2176-1 | cups security update |
Ubuntu USN |
USN-952-1 | CUPS vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: apple
Published:
Updated: 2024-08-07T01:35:53.570Z
Reserved: 2010-05-06T00:00:00.000Z
Link: CVE-2010-1748
No data.
Status : Modified
Published: 2010-06-17T16:30:01.920
Modified: 2026-04-29T01:13:23.040
Link: CVE-2010-1748
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN