Description
ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request.
Published: 2010-11-05
Score: 9.8 Critical
EPSS: 21.4% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2176-1 cups security update
Ubuntu USN Ubuntu USN USN-1012-1 CUPS vulnerability
References
Link Providers
http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_mozilla_firefox cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/050977.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051277.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051301.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2010-0811.html cve-icon cve-icon
http://secunia.com/advisories/42287 cve-icon cve-icon
http://secunia.com/advisories/42867 cve-icon cve-icon
http://secunia.com/advisories/43521 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-201207-10.xml cve-icon cve-icon
http://securitytracker.com/id?1024662 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.468323 cve-icon cve-icon
http://support.apple.com/kb/HT4435 cve-icon cve-icon
http://www.debian.org/security/2011/dsa-2176 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:232 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:233 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:234 cve-icon cve-icon
http://www.osvdb.org/68951 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2010-0866.html cve-icon cve-icon
http://www.securityfocus.com/bid/44530 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-1012-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/2856 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/3042 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/3088 cve-icon cve-icon
http://www.vupen.com/english/advisories/2011/0061 cve-icon cve-icon
http://www.vupen.com/english/advisories/2011/0535 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=624438 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/62882 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2010-2941 cve-icon
https://www.cve.org/CVERecord?id=CVE-2010-2941 cve-icon
History

No history.

Subscriptions

Apple Cups Mac Os X Mac Os X Server
Canonical Ubuntu Linux
Debian Debian Linux
Fedoraproject Fedora
Opensuse Opensuse
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Server Enterprise Linux Workstation
Suse Linux Enterprise Linux Enterprise Server
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T02:55:45.502Z

Reserved: 2010-08-04T00:00:00.000Z

Link: CVE-2010-2941

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-11-05T17:00:01.843

Modified: 2026-04-29T01:13:23.040

Link: CVE-2010-2941

cve-icon Redhat

Severity : Important

Publid Date: 2010-10-28T00:00:00Z

Links: CVE-2010-2941 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses