Unrated severityNVD Advisory· Published Sep 13, 2005· Updated Apr 16, 2026
CVE-2005-2874
CVE-2005-2874
Description
The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a "..\.." URL in an HTTP request.
Affected products
45cpe:2.3:a:easy_software_products:cups:1.1:*:*:*:*:*:*:*+ 44 more
- cpe:2.3:a:easy_software_products:cups:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.10_1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.11:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.19_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.19_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.19_rc3:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.19_rc4:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20_rc3:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20_rc4:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20_rc5:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.20_rc6:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.21_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.21_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.22_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.5_1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.5_2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.6_1:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.6_2:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.6_3:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.9:*:*:*:*:*:*:*
- cpe:2.3:a:easy_software_products:cups:1.1.9_1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- securitytracker.com/idnvdExploitPatchVendor Advisory
- bugzilla.redhat.com/bugzilla/show_bug.cginvdExploitPatchVendor Advisory
- www.cups.org/str.phpnvdVendor Advisory
- lwn.net/Alerts/152835/nvd
- www.cups.org/relnotes.phpnvd
- www.redhat.com/support/errata/RHSA-2005-772.htmlnvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774nvd
News mentions
0No linked articles in our index yet.