The generate_local_queue function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the host name. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2014/04/25/7 | mailing list third party advisory patch |
http://bzr.linuxfoundation.org/loggerhead/openprinting/cups-filters/revision/7194 | third party advisory patch |
http://openwall.com/lists/oss-security/2014/06/19/12 | third party advisory mailing list |