cups is vulnerable to denial of service (DoS). The vulnerability exists as a null pointer dereference flaw was found in the way CUPS handled subscriptions for printing job completion notifications. A local user could use this flaw to crash the CUPS daemon by submitting a large number of printing jobs requiring mail notification on completion, leading to a denial of service.
lab.gnucitizen.org/projects/cups-0day
lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
secunia.com/advisories/33937
secunia.com/advisories/43521
support.apple.com/kb/HT3438
www.debian.org/security/2011/dsa-2176
www.gnucitizen.org/blog/pwning-ubuntu-via-cups/
www.mandriva.com/security/advisories?name=MDVSA-2009:028
www.openwall.com/lists/oss-security/2008/11/19/3
www.openwall.com/lists/oss-security/2008/11/19/4
www.openwall.com/lists/oss-security/2008/11/20/1
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2008-1029.html
www.securityfocus.com/bid/32419
www.securitytracker.com/id?1021396
www.vupen.com/english/advisories/2009/0422
www.vupen.com/english/advisories/2011/0535
access.redhat.com/errata/RHSA-2008:1029
bugs.launchpad.net/ubuntu/+source/cups/+bug/298241
exchange.xforce.ibmcloud.com/vulnerabilities/46684
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10586
www.exploit-db.com/exploits/7150