Bugzilla – Bug 64684
VUL-0: CVE-2005-2874: cups denial of service attack
Last modified: 2021-11-03 15:50:31 UTC
http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042 23:12 Dec 30, 2004 I noticed your fix on STR#866 caused critical hang-up when invalid URL came. For example, 'GET /..a HTTP/1.1'. (This bug was found by nessus security audit software) I found the point, is_path_absolute in scheduler/client.c. while ((path = strstr(path, "/..")) != NULL) if (!path[3] || path[3] == '/') return (0); It should increment path pointer, isn't it? while ((path = strstr(path, "/..")) != NULL) { if (!path[3] || path[3] == '/') return (0); path++; }
<!-- SBZ_reproduce --> n/a
klaus, not sure if we are affected. perhaps we are.
General information for security-team regarding our cupsd security: If our "cups-1.1.19-preauth_security.patch" prevents arbitrary users (in particular those from external networks) to send invalid data to the cupsd then this DoS attack may be of minor importance for us. Reason: Any user who is allowed to print can always do DoS-like stuff, for example by sending this job to all print queues %!PS { } loop which will hang up any PostScript interpreter (Ghostscript or the printer's built-in interpreter). Regarding "cups-1.1.19-preauth_security.patch" see bug 43396 and http://portal.suse.com/sdb/en/2003/09/jsmeix_print-einrichten-90.html "Generalized Functionality for BrowseAllow and BrowseDeny".
Only 9.2 is affected.
Fixed in: 9.2 Not affected: 8.1 (UL1, NLD, SLES8), 8.2, 9.0, 9.1 and new packages submitted. Not much tested (yet). security-team please handle rest of update process ==> reassigning it
/work/src/done/PATCHINFO/patchinfo-9.2.cups
`patchinfo-box.cups' -> `/work/src/done/PATCHINFO/patchinfo-box.cups' `patchinfo-9.2.cups' -> `/work/src/done/PATCHINFO/patchinfo-9.2.cups' `patchinfo.cups' -> `/work/src/done/PATCHINFO/patchinfo.cups'
packages approved
Before questions arise: CAN number is: AN-2005-2874
CAN-2005-2874 my query only finds it without typo :)
CVE-2005-2874: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)