fkie_cve-2010-0542
Vulnerability from fkie_nvd
Published
2010-06-21 16:30
Modified
2025-04-11 00:51
Severity ?
Summary
The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file.
References
product-security@apple.comhttp://cups.org/articles.php?L596Patch
product-security@apple.comhttp://cups.org/str.php?L3516
product-security@apple.comhttp://cups.org/strfiles/3516/str3516.patchPatch
product-security@apple.comhttp://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
product-security@apple.comhttp://secunia.com/advisories/43521
product-security@apple.comhttp://security.gentoo.org/glsa/glsa-201207-10.xml
product-security@apple.comhttp://securitytracker.com/id?1024121
product-security@apple.comhttp://www.debian.org/security/2011/dsa-2176
product-security@apple.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:232
product-security@apple.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:234
product-security@apple.comhttp://www.securityfocus.com/bid/40943
product-security@apple.comhttp://www.vupen.com/english/advisories/2011/0535
product-security@apple.comhttps://bugzilla.redhat.com/show_bug.cgi?id=587746Patch
product-security@apple.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10365
af854a3a-2127-422b-91ae-364da2661108http://cups.org/articles.php?L596Patch
af854a3a-2127-422b-91ae-364da2661108http://cups.org/str.php?L3516
af854a3a-2127-422b-91ae-364da2661108http://cups.org/strfiles/3516/str3516.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43521
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201207-10.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1024121
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2176
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:232
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:234
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/40943
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0535
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=587746Patch
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10365
Impacted products
Vendor Product Version
apple cups *
apple cups 1.1
apple cups 1.1.1
apple cups 1.1.2
apple cups 1.1.3
apple cups 1.1.4
apple cups 1.1.5
apple cups 1.1.5-1
apple cups 1.1.5-2
apple cups 1.1.6
apple cups 1.1.6-1
apple cups 1.1.6-2
apple cups 1.1.6-3
apple cups 1.1.7
apple cups 1.1.8
apple cups 1.1.9
apple cups 1.1.9-1
apple cups 1.1.10
apple cups 1.1.10-1
apple cups 1.1.11
apple cups 1.1.12
apple cups 1.1.13
apple cups 1.1.14
apple cups 1.1.15
apple cups 1.1.16
apple cups 1.1.17
apple cups 1.1.18
apple cups 1.1.19
apple cups 1.1.19
apple cups 1.1.19
apple cups 1.1.19
apple cups 1.1.19
apple cups 1.1.19
apple cups 1.1.20
apple cups 1.1.20
apple cups 1.1.20
apple cups 1.1.20
apple cups 1.1.20
apple cups 1.1.20
apple cups 1.1.20
apple cups 1.1.21
apple cups 1.1.21
apple cups 1.1.21
apple cups 1.1.22
apple cups 1.1.22
apple cups 1.1.22
apple cups 1.1.23
apple cups 1.1.23
apple cups 1.2
apple cups 1.2
apple cups 1.2
apple cups 1.2
apple cups 1.2
apple cups 1.2.0
apple cups 1.2.1
apple cups 1.2.2
apple cups 1.2.3
apple cups 1.2.4
apple cups 1.2.5
apple cups 1.2.6
apple cups 1.2.7
apple cups 1.2.8
apple cups 1.2.9
apple cups 1.2.10
apple cups 1.2.11
apple cups 1.2.12
apple cups 1.3
apple cups 1.3
apple cups 1.3
apple cups 1.3.0
apple cups 1.3.1
apple cups 1.3.2
apple cups 1.3.3
apple cups 1.3.4
apple cups 1.3.5
apple cups 1.3.6
apple cups 1.3.7
apple cups 1.3.8
apple cups 1.3.9
apple cups 1.3.10
apple cups 1.3.11
apple cups 1.4.0
apple cups 1.4.1
apple cups 1.4.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EB4C70A-5B61-46A2-927F-94522D6BA71D",
              "versionEndIncluding": "1.4.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4D89E03-94D0-4F7F-9A54-3021E3E5A321",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "298D6BE7-7683-4225-8DD6-4C0FC5EB48BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "230B77E7-B1AE-4470-859D-7B5F99749D74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8FECBBD-B1A2-4F42-8A68-32AB8331BDC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B6070FC-4566-4314-940E-0AAE34B56E28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC691F07-8B38-4867-AB18-51F380CAEA46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E943EFBF-39A7-408F-8AC5-677E83DFDBB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EA7725A-4398-4C76-BEBF-10E56C7F34F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7415295-0FBF-4946-8D99-8CB2EC391319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C702EE3-4B7C-42EA-92AA-8717807CF67C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F74581-D71C-4FEC-BA8C-85EF4C1991BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ABCFB52-33D3-428C-B1D5-DCE504170A37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "45F03F2B-6AC3-4872-9032-293C2E9B837C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E02B6FB-C36D-45F3-95F3-566CA03B29A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "96093309-A87D-48D0-84DA-446255ABF231",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF67F149-614B-4507-A15F-E557A1B73423",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A14432-D8A1-4D19-9408-B9B4F2FC6B0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*",
              "matchCriteriaId": "49862F77-B8DE-4AA7-AE17-B348B05AC00E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D7719F-03E0-4E66-A50A-F8E857A9B6AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3139FDA-9476-4414-B349-7119E63FD268",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "523FE78C-441F-4ACD-B9F2-3E5293E277AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "F887B5B1-7528-4086-AE6C-134F54A93342",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D6D24ED-0D73-4CF2-B746-6EF29F2EF56F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8C5C552-6276-4791-80CD-6B3EB425EF04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "8335D4E3-563D-4288-B708-A9635BCA595F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "5279D055-248A-4BD1-9FBB-0024BA16DF5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF791C1D-9AF8-4F0F-8F4B-844BC9A55DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "16519855-FCB9-44A8-9C7E-116192327BAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B1D9330B-C51A-4C7D-A322-85103C64D86C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "2DA0C19F-95EB-429C-AF06-A2C1D5643662",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "225CCE80-FF4B-4B39-B8BD-EB4710047524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "07925DD8-50C0-4908-95D1-7342A4617BBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A519DB-6C6D-4094-814D-33BD5EF389BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B6ED7566-5092-4B08-97A9-B2B53117A224",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "98DCAC0C-896F-4353-A665-5BCD0D8AEBA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "E72614CD-8F70-4E07-AD83-8FDE8026CEC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "48E62419-C165-4B42-8C23-E24821BD4BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "217D804B-CA56-49CE-B9EB-2A297EB1763C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "A41E8583-C837-4871-B4D2-FD41C78D538E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "D480C37B-0DA8-4096-80B0-5198FE589A4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "74F5A83B-3C1A-49F3-A9D6-F7B9B897E447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "241D4183-879D-4974-BACB-A6987EDA2E7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "96592A93-4967-4B91-BCF7-558DC472E7BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8758715D-B973-4960-8B7D-6F9A11E73288",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "0370E9EB-B830-4362-B83C-912579695691",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA3EC6EE-720D-4F27-A2E1-88AE53FC41A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D644926A-C2A5-45FE-85A3-2782CE87ED86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2:b1:*:*:*:*:*:*",
              "matchCriteriaId": "AFB34629-DB13-4164-8A18-BD818E50528B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2:b2:*:*:*:*:*:*",
              "matchCriteriaId": "2D432471-B5FD-4B1D-82DF-6F3152752071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "960DE41E-63DB-45EB-9B19-6349BDA05086",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "A57D2299-3409-4907-9FC0-5C3C715CDB37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "C7EB92FA-3669-4530-BE69-84CF01D98FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0696E675-0A13-45FC-8917-845E6FF7A311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BAC98C-1FE6-42A3-8B62-E3C321914F6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCC3EF2F-0140-4185-9FB3-2B595B61CDC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C36785A-F735-45C0-986B-9624AD65F0C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C1D3916-607F-44E8-9D47-93C6C0789083",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "174613C3-A04B-4701-849B-BAA598BF4F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C1137C-BE3D-45F9-83C9-D212107F0E14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CBC1F81-E93A-42A7-8BC8-4B903688F2E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FA876FF-C58A-45CF-A8E8-E2068DF79421",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FD78771-BD9A-4AC2-B664-B189DD288FB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "50A16424-732F-4B76-A753-1642A97BC1EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E189C976-2DD2-485C-828E-7FC3DC6A8F32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A86CA90F-A944-4F3E-B75F-8147125335D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3:b1:*:*:*:*:*:*",
              "matchCriteriaId": "690C4DEC-1467-4D7D-8E73-6EE1758439D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FB5CA96B-411E-47BE-81A1-1C2E240A25F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "AA5A29C9-1913-4B8F-B162-66E71BEABD1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FAFABDC-E40F-4C53-AC66-94EFD077665D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "42A2F7B3-F4A7-416E-A07F-D4C5F0768B6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F96C1B80-9E20-4832-8308-BF7911569EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F2D7DB3-F467-4BC0-83BB-4706D067A2C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABD33C2C-7D39-4CCE-AC99-BC7B1B205A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C394DC-65A7-4713-B823-6F5D329A0C5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5E9F74F-3C7D-486A-8BA1-EE2A73160B39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "69BD64BB-BDA7-4F82-8324-B7C7C941133C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCAEE03E-0B8A-4D10-BD4D-2DA25B7BBE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C671B95-8892-4D71-87FE-BABF5CBEC144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8814509-8B08-46C6-AE50-19B7D30DCF40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0718FB6B-D787-409A-B535-0318F2C63A81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "84AD2D5B-DC7A-49A3-9238-9728F03AAFE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBD0B172-FB22-4270-B73D-4489EC2F4CE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:apple:cups:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F12A5E71-D6E3-475E-817B-C8E6FC5B41B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n _WriteProlog de texttops.c en texttops en el subsistema Text Filter de CUPS en versiones anteriores a la v1.4.4 no chequea los valores devueltos de ciertas llamadas calloc, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (dereferenciaci\u00f3n de puntero nulo o corrupci\u00f3n de la memoria din\u00e1mica) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un fichero modificado."
    }
  ],
  "id": "CVE-2010-0542",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-06-21T16:30:01.087",
  "references": [
    {
      "source": "product-security@apple.com",
      "tags": [
        "Patch"
      ],
      "url": "http://cups.org/articles.php?L596"
    },
    {
      "source": "product-security@apple.com",
      "url": "http://cups.org/str.php?L3516"
    },
    {
      "source": "product-security@apple.com",
      "tags": [
        "Patch"
      ],
      "url": "http://cups.org/strfiles/3516/str3516.patch"
    },
    {
      "source": "product-security@apple.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"
    },
    {
      "source": "product-security@apple.com",
      "url": "http://secunia.com/advisories/43521"
    },
    {
      "source": "product-security@apple.com",
      "url": "http://security.gentoo.org/glsa/glsa-201207-10.xml"
    },
    {
      "source": "product-security@apple.com",
      "url": "http://securitytracker.com/id?1024121"
    },
    {
      "source": "product-security@apple.com",
      "url": "http://www.debian.org/security/2011/dsa-2176"
    },
    {
      "source": "product-security@apple.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232"
    },
    {
      "source": "product-security@apple.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234"
    },
    {
      "source": "product-security@apple.com",
      "url": "http://www.securityfocus.com/bid/40943"
    },
    {
      "source": "product-security@apple.com",
      "url": "http://www.vupen.com/english/advisories/2011/0535"
    },
    {
      "source": "product-security@apple.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=587746"
    },
    {
      "source": "product-security@apple.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10365"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://cups.org/articles.php?L596"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://cups.org/str.php?L3516"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://cups.org/strfiles/3516/str3516.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/43521"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201207-10.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1024121"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2011/dsa-2176"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:234"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/40943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0535"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=587746"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10365"
    }
  ],
  "sourceIdentifier": "product-security@apple.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…