CVE-2005-2874

The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a "..\.." URL in an HTTP request.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:easy_software_products:cups:1.1:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.5_1:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.5_2:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.6_1:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.6_2:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.6_3:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.8:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.9_1:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.10_1:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.11:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.19_rc1:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.19_rc2:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.19_rc3:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.19_rc4:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.20_rc1:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.20_rc2:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.20_rc3:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.20_rc4:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.20_rc5:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.20_rc6:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.21_rc1:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.21_rc2:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
cpe:2.3:a:easy_software_products:cups:1.1.22_rc2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:00

Type Values Removed Values Added
References () http://lwn.net/Alerts/152835/ - () http://lwn.net/Alerts/152835/ -
References () http://securitytracker.com/id?1012811 - Exploit, Patch, Vendor Advisory () http://securitytracker.com/id?1012811 - Exploit, Patch, Vendor Advisory
References () http://www.cups.org/relnotes.php#010123 - () http://www.cups.org/relnotes.php#010123 -
References () http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042 - Vendor Advisory () http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042 - Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-772.html - () http://www.redhat.com/support/errata/RHSA-2005-772.html -
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072 - Exploit, Patch, Vendor Advisory () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072 - Exploit, Patch, Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774 -

Information

Published : 2005-09-13 22:03

Updated : 2024-11-21 00:00


NVD link : CVE-2005-2874

Mitre link : CVE-2005-2874

CVE.ORG link : CVE-2005-2874


JSON object : View

Products Affected

easy_software_products

  • cups