|Description||Double free vulnerability in the process_browse_data function in CUPS 1.3.5 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via crafted UDP Browse packets to the cupsd port (631/udp), related to an unspecified manipulation of a remote printer. NOTE: some of these details are obtained from third party information.|
|Source||CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)|
|NVD severity||high (attack range: remote)|
Vulnerable and fixed packages
The table below lists information on source packages.
|cups (PTS)||wheezy (security), wheezy||1.5.3-5+deb7u6||fixed|
|jessie (security), jessie||1.7.5-11+deb8u1||fixed|
The information below is based on the following data on fixed versions.
[sarge] - cupsys <no-dsa> (Remote DoS is minor issue)