CVE-2010-2941 (CNNVD-201011-032)

CRITICAL
中文标题:
Apple CUPS cupsd ipp.c文件资源管理错误漏洞
英文标题:
ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with...
CVSS分数: 9.8
发布时间: 2010-11-05 16:28:00
漏洞类型: 资源管理错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

CUPS 是一个类Unix操作系统的组合式打印系统,允许一台电脑作为打印服务器。 CUPS 1.4.4以及之前版本中的cupsd中的ipp.c文件不能为带有无效字符串数据类型的属性值正确分配内存。远程攻击者可以借助特制的IPP请求导致拒绝服务(释放后使用以及应用程序崩溃)或者可能执行任意代码。

英文描述:

ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request.

CWE类型:
CWE-416
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
apple cups * - - cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*
apple mac_os_x * - - cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
apple mac_os_x_server * - - cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
fedoraproject fedora 12 - - cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
fedoraproject fedora 13 - - cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*
fedoraproject fedora 14 - - cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*
canonical ubuntu_linux 6.06 - - cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
canonical ubuntu_linux 8.04 - - cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
canonical ubuntu_linux 9.10 - - cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
canonical ubuntu_linux 10.04 - - cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
canonical ubuntu_linux 10.10 - - cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
debian debian_linux 5.0 - - cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
opensuse opensuse 11.1 - - cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
opensuse opensuse 11.2 - - cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
opensuse opensuse 11.3 - - cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
suse linux_enterprise 10.0 - - cpe:2.3:o:suse:linux_enterprise:10.0:sp3:*:*:*:*:*:*
suse linux_enterprise 11.0 - - cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
suse linux_enterprise_server 9 - - cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*
redhat enterprise_linux 5.0 - - cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
redhat enterprise_linux 6.0 - - cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
redhat enterprise_linux_desktop 5.0 - - cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
redhat enterprise_linux_server 5.0 - - cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
redhat enterprise_linux_workstation 5.0 - - cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
MDVSA-2010:234 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
ADV-2010-3042 vdb-entry
cve.org
访问
RHSA-2010:0811 vendor-advisory
cve.org
访问
RHSA-2010:0866 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
MDVSA-2010:232 vendor-advisory
cve.org
访问
FEDORA-2010-17615 vendor-advisory
cve.org
访问
SUSE-SR:2010:023 vendor-advisory
cve.org
访问
ADV-2010-2856 vdb-entry
cve.org
访问
DSA-2176 vendor-advisory
cve.org
访问
1024662 vdb-entry
cve.org
访问
APPLE-SA-2010-11-10-1 vendor-advisory
cve.org
访问
42867 third-party-advisory
cve.org
访问
GLSA-201207-10 vendor-advisory
cve.org
访问
ADV-2011-0061 vdb-entry
cve.org
访问
FEDORA-2010-17641 vendor-advisory
cve.org
访问
ADV-2011-0535 vdb-entry
cve.org
访问
USN-1012-1 vendor-advisory
cve.org
访问
FEDORA-2010-17627 vendor-advisory
cve.org
访问
MDVSA-2010:233 vendor-advisory
cve.org
访问
42287 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
cups-cupsd-code-execution(62882) vdb-entry
cve.org
访问
43521 third-party-advisory
cve.org
访问
SSA:2010-333-01 vendor-advisory
cve.org
访问
68951 vdb-entry
cve.org
访问
44530 vdb-entry
cve.org
访问
ADV-2010-3088 vdb-entry
cve.org
访问
CVSS评分详情
9.8
CRITICAL
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS版本: 3.1
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2010-11-05 16:28:00
修改时间:
2024-08-07 02:55:45
创建时间:
2025-11-11 15:33:09
更新时间:
2025-11-11 15:49:47
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2010-2941 2025-11-11 15:18:17 2025-11-11 07:33:09
NVD nvd_CVE-2010-2941 2025-11-11 14:53:27 2025-11-11 07:41:58
CNNVD cnnvd_CNNVD-201011-032 2025-11-11 15:09:11 2025-11-11 07:49:47
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:49:47
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-201011-032; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 资源管理错误
  • cnnvd_id: 未提取 -> CNNVD-201011-032
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:58
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 9.8; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 0 → 23; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 9.8
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • cvss_version: NOT_EXTRACTED -> 3.1
  • affected_products_count: 0 -> 23
  • data_sources: ['cve'] -> ['cve', 'nvd']