Vulnerability Name:

CVE-2008-0882 (CCN-40718)

Assigned:2008-01-07
Published:2008-01-07
Updated:2017-09-29
Summary:Double free vulnerability in the process_browse_data function in CUPS 1.3.5 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via crafted UDP Browse packets to the cupsd port (631/udp), related to an unspecified manipulation of a remote printer.
Note: some of these details are obtained from third party information.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.0 Medium (REDHAT CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
3.7 Low (REDHAT Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2008-0882

Source: CONFIRM
Type: UNKNOWN
http://docs.info.apple.com/article.html?artnum=307562

Source: APPLE
Type: UNKNOWN
APPLE-SA-2008-03-18

Source: SUSE
Type: UNKNOWN
SUSE-SA:2008:012

Source: CCN
Type: RHSA-2008-0157
Important: cups security update

Source: CCN
Type: SA28994
CUPS "process_browse_data()" Double Free Vulnerability

Source: SECUNIA
Type: Vendor Advisory
28994

Source: SECUNIA
Type: Vendor Advisory
29067

Source: SECUNIA
Type: Vendor Advisory
29120

Source: SECUNIA
Type: UNKNOWN
29132

Source: SECUNIA
Type: UNKNOWN
29251

Source: CCN
Type: SA29420
Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
29420

Source: SECUNIA
Type: UNKNOWN
29485

Source: SECUNIA
Type: UNKNOWN
29603

Source: SECUNIA
Type: UNKNOWN
29634

Source: GENTOO
Type: UNKNOWN
GLSA-200804-01

Source: CCN
Type: SECTRACK ID: 1019473
CUPS Double Free Bug in process_browse_data() May Let Remote Users Execute Arbitrary Code

Source: CCN
Type: CUPS STR #2656
cupsd dies due to double freeing of a remote printer

Source: CONFIRM
Type: UNKNOWN
http://www.cups.org/str.php?L2656

Source: DEBIAN
Type: UNKNOWN
DSA-1530

Source: DEBIAN
Type: DSA-1530
cupsys -- multiple vulnerabilities

Source: CCN
Type: GLSA-200804-01
CUPS: Multiple vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:050

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:051

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0157

Source: BID
Type: UNKNOWN
27906

Source: CCN
Type: BID-27906
CUPS 'process_browse_data()' Remote Double Free Denial of Service Vulnerability

Source: SECTRACK
Type: UNKNOWN
1019473

Source: CCN
Type: TLSA-2008-19
Multiple vulnerabilities exist in cups

Source: CCN
Type: USN-598-1
CUPS vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-598-1

Source: VUPEN
Type: UNKNOWN
ADV-2008-0623

Source: VUPEN
Type: UNKNOWN
ADV-2008-0924

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=433758

Source: XF
Type: UNKNOWN
cups-processbrowsedata-code-execution(40718)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9625

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-1901

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-1976

Source: SUSE
Type: SUSE-SA:2008:012
cups security problems

Vulnerable Configuration:Configuration 1:
  • cpe:/a:cups:cups:1.3.5:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apple:cups:1.3.5:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20080882
    V
    CVE-2008-0882
    2015-11-16
    oval:org.mitre.oval:def:17501
    P
    USN-598-1 -- cupsys vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:18674
    P
    DSA-1530-1 cupsys - multiple vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:7966
    P
    DSA-1530 cupsys -- Several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:22585
    P
    ELSA-2008:0157: cups security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:9625
    V
    Double free vulnerability in the process_browse_data function in CUPS 1.3.5 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via crafted UDP Browse packets to the cupsd port (631/udp), related to an unspecified manipulation of a remote printer. NOTE: some of these details are obtained from third party information.
    2013-04-29
    oval:org.debian:def:1530
    V
    Several vulnerabilities
    2008-03-25
    oval:com.redhat.rhsa:def:20080157
    P
    RHSA-2008:0157: cups security update (Important)
    2008-02-21
    BACK
    cups cups 1.3.5
    apple cups 1.3.5
    gentoo linux *
    mandrakesoft mandrake linux corporate server 3.0
    novell linux desktop 9
    novell open enterprise server *
    canonical ubuntu 6.06
    novell suse linux enterprise server 10 sp2
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 3.0
    turbolinux turbolinux fuji
    turbolinux turbolinux personal *
    turbolinux turbolinux multimedia *
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    canonical ubuntu 7.04
    redhat enterprise linux 5
    canonical ubuntu 7.10
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2007.1
    novell open enterprise server *
    novell opensuse 10.2
    novell opensuse 10.3