VYPR
Unrated severityNVD Advisory· Published Sep 13, 2005· Updated Apr 16, 2026

CVE-2005-2874

CVE-2005-2874

Description

The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a "..\.." URL in an HTTP request.

Affected products

45
  • cpe:2.3:a:easy_software_products:cups:1.1:*:*:*:*:*:*:*+ 44 more
    • cpe:2.3:a:easy_software_products:cups:1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.10_1:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.11:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.19_rc1:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.19_rc2:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.19_rc3:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.19_rc4:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.2:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.20_rc1:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.20_rc2:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.20_rc3:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.20_rc4:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.20_rc5:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.20_rc6:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.21_rc1:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.21_rc2:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.22_rc2:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.3:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.5:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.5_1:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.5_2:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.6_1:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.6_2:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.6_3:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.8:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.9:*:*:*:*:*:*:*
    • cpe:2.3:a:easy_software_products:cups:1.1.9_1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.