Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w4jh-3cpq-48pp

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The generate_local_queue function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the host name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.

The generate_local_queue function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the host name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.

EPSS

Процентиль: 66%
0.00523
Низкий

Дефекты

CWE-77

Связанные уязвимости

ubuntu
больше 11 лет назад

The generate_local_queue function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the host name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.

redhat
почти 12 лет назад

The generate_local_queue function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the host name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.

nvd
больше 11 лет назад

The generate_local_queue function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the host name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.

debian
больше 11 лет назад

The generate_local_queue function in utils/cups-browsed.c in cups-brow ...

EPSS

Процентиль: 66%
0.00523
Низкий

Дефекты

CWE-77