The ippReadIO function in cups/ipp.c in cupsd in CUPS before 1.3.10 does not properly initialize memory for IPP request packets, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a scheduler request with two consecutive IPP_TAG_UNSUPPORTED tags.
lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
secunia.com/advisories/35322
secunia.com/advisories/35328
secunia.com/advisories/35340
secunia.com/advisories/35342
secunia.com/advisories/35685
secunia.com/advisories/36701
securitytracker.com/id?1022321
support.apple.com/kb/HT3865
www.coresecurity.com/content/AppleCUPS-null-pointer-vulnerability
www.debian.org/security/2009/dsa-1811
www.redhat.com/support/errata/RHSA-2009-1082.html
www.redhat.com/support/errata/RHSA-2009-1083.html
www.securityfocus.com/archive/1/504032/100/0/threaded
www.securityfocus.com/bid/35169
www.ubuntu.com/usn/USN-780-1
bugzilla.redhat.com/show_bug.cgi?id=500972
exchange.xforce.ibmcloud.com/vulnerabilities/50926
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9631