Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-8166

Опубликовано: 24 мар. 2015
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The browsing feature in the server in CUPS does not filter ANSI escape sequences from shared printer names, which might allow remote attackers to execute arbitrary code via a crafted printer name.

A flaw was found in the way the CUPS daemon added shared printers announced through the network. A malicious host or user could send a specially crafted UDP packet to a CUPS server that, when processed, could potentially lead to arbitrary code execution with the privileges of the user running the CUPS daemon.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5cupsWill not fix
Red Hat Enterprise Linux 6cupsWill not fix
Red Hat Enterprise Linux 7cupsNot affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1084577cups: code execution via unescape ANSI escape sequences

EPSS

Процентиль: 77%
0.01071
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 8 лет назад

The browsing feature in the server in CUPS does not filter ANSI escape sequences from shared printer names, which might allow remote attackers to execute arbitrary code via a crafted printer name.

CVSS3: 8.8
nvd
около 8 лет назад

The browsing feature in the server in CUPS does not filter ANSI escape sequences from shared printer names, which might allow remote attackers to execute arbitrary code via a crafted printer name.

CVSS3: 8.8
debian
около 8 лет назад

The browsing feature in the server in CUPS does not filter ANSI escape ...

CVSS3: 8.8
github
больше 3 лет назад

The browsing feature in the server in CUPS does not filter ANSI escape sequences from shared printer names, which might allow remote attackers to execute arbitrary code via a crafted printer name.

EPSS

Процентиль: 77%
0.01071
Низкий

4.3 Medium

CVSS2