The generate_local_queue function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the host name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.
References
Link | Resource |
---|---|
http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194 | Patch Third Party Advisory |
http://openwall.com/lists/oss-security/2014/04/25/7 | Patch Third Party Advisory |
http://openwall.com/lists/oss-security/2014/06/19/12 | Third Party Advisory |
http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194 | Patch Third Party Advisory |
http://openwall.com/lists/oss-security/2014/04/25/7 | Patch Third Party Advisory |
http://openwall.com/lists/oss-security/2014/06/19/12 | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194 - Patch, Third Party Advisory | |
References | () http://openwall.com/lists/oss-security/2014/04/25/7 - Patch, Third Party Advisory | |
References | () http://openwall.com/lists/oss-security/2014/06/19/12 - Third Party Advisory |
Information
Published : 2014-06-22 21:55
Updated : 2024-11-21 02:09
NVD link : CVE-2014-4336
Mitre link : CVE-2014-4336
CVE.ORG link : CVE-2014-4336
JSON object : View
Products Affected
linuxfoundation
- cups-filters
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')