cupsd in CUPS 1.3.9 and earlier allows local users, and possibly remote attackers, to cause a denial of service (daemon crash) by adding a large number of RSS Subscriptions, which triggers a NULL pointer dereference. NOTE: this issue can be triggered remotely by leveraging CVE-2008-5184.
lab.gnucitizen.org/projects/cups-0day
lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
secunia.com/advisories/33937
secunia.com/advisories/43521
support.apple.com/kb/HT3438
www.debian.org/security/2011/dsa-2176
www.gnucitizen.org/blog/pwning-ubuntu-via-cups/
www.mandriva.com/security/advisories?name=MDVSA-2009:028
www.openwall.com/lists/oss-security/2008/11/19/3
www.openwall.com/lists/oss-security/2008/11/19/4
www.openwall.com/lists/oss-security/2008/11/20/1
www.redhat.com/support/errata/RHSA-2008-1029.html
www.securityfocus.com/bid/32419
www.securitytracker.com/id?1021396
www.vupen.com/english/advisories/2009/0422
www.vupen.com/english/advisories/2011/0535
bugs.launchpad.net/ubuntu/+source/cups/+bug/298241
exchange.xforce.ibmcloud.com/vulnerabilities/46684
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10586
www.exploit-db.com/exploits/7150