Vulnerability Details : CVE-2005-2874
The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a "..\.." URL in an HTTP request.
Vulnerability category: Denial of service
Products affected by CVE-2005-2874
- cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20_rc6:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.5_1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.19_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.19_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20_rc3:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.22_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.6_1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.6_2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.10_1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.21_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.21_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.5_2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.9_1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.19_rc3:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.19_rc4:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20_rc4:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20_rc5:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.6_3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-2874
9.47%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2874
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2005-2874
-
http://www.redhat.com/support/errata/RHSA-2005-772.html
Support
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774
404 Not Found
-
http://securitytracker.com/id?1012811
GoDaddy Domain Name SearchExploit;Patch;Vendor Advisory
-
http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042
Page Has Moved - CUPS.orgVendor Advisory
-
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072
168072 – CAN-2005-2874 Malformed HTTP Request URL denial of serviceExploit;Patch;Vendor Advisory
-
http://lwn.net/Alerts/152835/
Fedora alert FEDORA-2005-908 (cups) [LWN.net]
-
http://www.cups.org/relnotes.php#010123
Page Has Moved - CUPS.org
Jump to