The browsing feature in the server in CUPS does not filter ANSI escape sequences from shared printer names, which might allow remote attackers to execute arbitrary code via a crafted printer name.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1084577 | issue tracking patch vdb entry third party advisory |
http://www.securityfocus.com/bid/73300 | vdb entry third party advisory |
http://www.openwall.com/lists/oss-security/2015/03/24/15 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2015/03/24/2 | third party advisory mailing list |