The browsing feature in the server in CUPS does not filter ANSI escape sequences from shared printer names, which might allow remote attackers to execute arbitrary code via a crafted printer name.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.openwall.com/lists/oss-security/2015/03/24/15 | Mailing List Third Party Advisory | 
| http://www.openwall.com/lists/oss-security/2015/03/24/2 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/bid/73300 | Third Party Advisory VDB Entry | 
| https://bugzilla.redhat.com/show_bug.cgi?id=1084577 | Issue Tracking Patch Third Party Advisory VDB Entry | 
| http://www.openwall.com/lists/oss-security/2015/03/24/15 | Mailing List Third Party Advisory | 
| http://www.openwall.com/lists/oss-security/2015/03/24/2 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/bid/73300 | Third Party Advisory VDB Entry | 
| https://bugzilla.redhat.com/show_bug.cgi?id=1084577 | Issue Tracking Patch Third Party Advisory VDB Entry | 
Configurations
                    History
                    21 Nov 2024, 02:18
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.openwall.com/lists/oss-security/2015/03/24/15 - Mailing List, Third Party Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2015/03/24/2 - Mailing List, Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/73300 - Third Party Advisory, VDB Entry | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=1084577 - Issue Tracking, Patch, Third Party Advisory, VDB Entry | 
Information
                Published : 2018-01-12 17:29
Updated : 2024-11-21 02:18
NVD link : CVE-2014-8166
Mitre link : CVE-2014-8166
CVE.ORG link : CVE-2014-8166
JSON object : View
Products Affected
                cups
- cups
 
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
