Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2005-2874 (GCVE-0-2005-2874)
Vulnerability from cvelistv5 – Published: 2005-09-13 04:00 – Updated: 2024-08-07 22:53
VLAI?
EPSS
Summary
The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a "..\.." URL in an HTTP request.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
Date Public ?
2005-01-07 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T22:53:29.901Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2005-908",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lwn.net/Alerts/152835/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cups.org/relnotes.php#010123"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072"
},
{
"name": "1012811",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1012811"
},
{
"name": "RHSA-2005:772",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-772.html"
},
{
"name": "oval:org.mitre.oval:def:9774",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-01-07T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a \"..\\..\" URL in an HTTP request."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "FEDORA-2005-908",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lwn.net/Alerts/152835/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cups.org/relnotes.php#010123"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072"
},
{
"name": "1012811",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1012811"
},
{
"name": "RHSA-2005:772",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-772.html"
},
{
"name": "oval:org.mitre.oval:def:9774",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2005-2874",
"datePublished": "2005-09-13T04:00:00.000Z",
"dateReserved": "2005-09-13T00:00:00.000Z",
"dateUpdated": "2024-08-07T22:53:29.901Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2005-2874\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2005-09-13T22:03:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a \\\"..\\\\..\\\" URL in an HTTP request.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A40BA21C-4F77-4BB3-A75C-A84FD0A752C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCF4C8D0-3030-4DD5-800B-76A582A4CD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75DE26A5-D9EB-4C89-944D-D1C69C6E7FEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E747A07-0E8C-494F-BF0C-5B18EC0AC742\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"734D0C2C-F71F-461A-87EE-202C6B706753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C5DDB0-335F-454F-A672-038E2E095B78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.5_1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F8C59BA-5D45-44D6-BFA4-0609EC6B19DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.5_2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"291C3E28-19C2-4C01-B52A-AB6A674822AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.6_1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13F87630-EF23-4F24-AB07-61A8933DE273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.6_2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE6ECE2C-C09C-435B-A856-4A097CFFEFDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.6_3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87643004-E24E-494E-A56D-95D1DA05C97B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35E65857-12C7-49DE-AD27-3CACD456231C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B86105-0B9B-459D-9742-EBA7E02BC3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF3BE0A1-C73E-4572-9FCF-F069354F9803\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.9_1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E128DAF6-FB24-4F3E-8462-1B751B2F21C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47CEF035-57A6-470B-916A-E5562C28E866\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.10_1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CE113D7-9680-4E60-A9D1-AF531F82A35D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F338B2C9-167B-4F2E-883A-2315660B24E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E26BB15-4CF8-4496-A7F7-EB34C444EF72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D414984E-4F6B-4278-8346-968587E4B18E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C36DCB-2FDD-44E6-85E8-875575AAE69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C4B7C23-0C54-4FBA-A774-9CC1E148376E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA0EF14-33E6-4D44-B86E-F04014EA3C8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A786A770-919E-4E23-949D-D836F316618A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00A2249C-73DE-434E-A41F-4EDB0ADC0845\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.19_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"176617A7-C4B8-4411-BF53-8F1224166490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.19_rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAC31855-304C-423F-B186-9BFACDE9E34B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.19_rc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35A80DC4-6443-4204-B297-EB208A12EA3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.19_rc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A74F20-FE2D-42B1-86C6-0D030CA16CF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73AB4D3D-FF35-4A50-A144-3AD41F6F2E55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB7653F1-70E2-423F-A6A9-30333644B506\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.20_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"274916CC-03CC-4E8C-9CF3-8B3A5F630604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.20_rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BE0846C-B97E-428E-B1F8-E336BDAEFC58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.20_rc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D22AE1B0-257F-4B2C-B280-1A1AE1DCE0D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.20_rc4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89E17EC9-047F-4644-B839-F01C109D3CB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.20_rc5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8C3628B-2272-4D39-BDF5-7D785933A71D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.20_rc6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98F27B48-A422-462E-BD61-561347870B51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2406EA53-15E7-4CFE-850B-D3CF3FA8560A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.21_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA2D30B5-C9A5-4549-B8F0-AD541C9CDFA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.21_rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9644EB8E-66D0-4D2F-9FCE-9F226E4FE70E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1512A96-B8E7-4DB7-A4CB-8FD3773BFC97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"787B918D-9CCC-44FE-92AF-E8DF1E91A3C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:easy_software_products:cups:1.1.22_rc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F875BE5-7F09-4AAC-AA84-3F88106E4E0C\"}]}]}],\"references\":[{\"url\":\"http://lwn.net/Alerts/152835/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1012811\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.cups.org/relnotes.php#010123\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-772.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lwn.net/Alerts/152835/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1012811\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.cups.org/relnotes.php#010123\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-772.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
RHSA-2005:772
Vulnerability from csaf_redhat - Published: 2005-09-27 11:53 - Updated: 2025-11-21 17:29Summary
Red Hat Security Advisory: cups security update
Severity
Moderate
Notes
Topic: Updated CUPS packages that fix a security issue are now available for Red
Hat Enterprise Linux.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details: The Common UNIX Printing System (CUPS) provides a portable printing layer
for UNIX(R) operating systems.
A bug was found in the way CUPS processes malformed HTTP requests. It is
possible for a remote user capable of connecting to the CUPS daemon to
issue a malformed HTTP GET request that causes CUPS to enter an
infinite loop. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2005-2874 to this issue.
Two small bugs have also been fixed in this update. A signal handling
problem has been fixed that could occasionally cause the scheduler to stop
when told to reload. A problem with tracking open file descriptors under
certain specific circumstances has also been fixed.
All users of CUPS should upgrade to these erratum packages, which contain a
patch to correct this issue.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a "..\.." URL in an HTTP request.
Vendor Fix
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
https://access.redhat.com/errata/RHSA-2005:772
References
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated CUPS packages that fix a security issue are now available for Red\nHat Enterprise Linux.\n\nThis update has been rated as having moderate security impact by the Red \nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Common UNIX Printing System (CUPS) provides a portable printing layer\nfor UNIX(R) operating systems.\n\nA bug was found in the way CUPS processes malformed HTTP requests. It is\npossible for a remote user capable of connecting to the CUPS daemon to\nissue a malformed HTTP GET request that causes CUPS to enter an\ninfinite loop. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-2874 to this issue.\n\nTwo small bugs have also been fixed in this update. A signal handling\nproblem has been fixed that could occasionally cause the scheduler to stop\nwhen told to reload. A problem with tracking open file descriptors under\ncertain specific circumstances has also been fixed.\n\nAll users of CUPS should upgrade to these erratum packages, which contain a\npatch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2005:772",
"url": "https://access.redhat.com/errata/RHSA-2005:772"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "164641",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=164641"
},
{
"category": "external",
"summary": "164642",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=164642"
},
{
"category": "external",
"summary": "168072",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=168072"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_772.json"
}
],
"title": "Red Hat Security Advisory: cups security update",
"tracking": {
"current_release_date": "2025-11-21T17:29:35+00:00",
"generator": {
"date": "2025-11-21T17:29:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2005:772",
"initial_release_date": "2005-09-27T11:53:00+00:00",
"revision_history": [
{
"date": "2005-09-27T11:53:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2005-09-27T00:00:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:29:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.8?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"product": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"product_id": "cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.8?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.8?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.8.ia64",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.8.ia64",
"product_id": "cups-1:1.1.22-0.rc1.9.8.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.8?arch=ia64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.8.i386",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.i386",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.8?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.8?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.22-0.rc1.9.8.i386",
"product": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.i386",
"product_id": "cups-devel-1:1.1.22-0.rc1.9.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.8?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.8.i386",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.8.i386",
"product_id": "cups-1:1.1.22-0.rc1.9.8.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.8?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.8.x86_64",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.x86_64",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"product": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"product_id": "cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.8?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.8.x86_64",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.8.x86_64",
"product_id": "cups-1:1.1.22-0.rc1.9.8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.8?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.8.src",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.8.src",
"product_id": "cups-1:1.1.22-0.rc1.9.8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.8?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.8?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.8?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.8?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"product": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"product_id": "cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.8?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.8?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.8.ppc",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.8.ppc",
"product_id": "cups-1:1.1.22-0.rc1.9.8.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.8?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"product": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"product_id": "cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.8?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.8.s390x",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.8.s390x",
"product_id": "cups-1:1.1.22-0.rc1.9.8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.8?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cups-libs-1:1.1.22-0.rc1.9.8.s390",
"product": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.s390",
"product_id": "cups-libs-1:1.1.22-0.rc1.9.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-libs@1.1.22-0.rc1.9.8?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"product": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"product_id": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-debuginfo@1.1.22-0.rc1.9.8?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-devel-1:1.1.22-0.rc1.9.8.s390",
"product": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.s390",
"product_id": "cups-devel-1:1.1.22-0.rc1.9.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups-devel@1.1.22-0.rc1.9.8?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "cups-1:1.1.22-0.rc1.9.8.s390",
"product": {
"name": "cups-1:1.1.22-0.rc1.9.8.s390",
"product_id": "cups-1:1.1.22-0.rc1.9.8.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cups@1.1.22-0.rc1.9.8?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.8.src"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-devel-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.8.ppc64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:cups-libs-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.8.src"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.ppc64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.8.src"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-devel-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.8.ppc64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:cups-libs-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.8.src"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-devel-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-devel-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.8.i386"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.8.ia64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.8.ppc"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.8.ppc64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.8.s390"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.8.s390x"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cups-libs-1:1.1.22-0.rc1.9.8.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:cups-libs-1:1.1.22-0.rc1.9.8.x86_64"
},
"product_reference": "cups-libs-1:1.1.22-0.rc1.9.8.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2005-2874",
"discovery_date": "2005-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1617763"
}
],
"notes": [
{
"category": "description",
"text": "The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a \"..\\..\" URL in an HTTP request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "security flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:cups-1:1.1.22-0.rc1.9.8.i386",
"4AS:cups-1:1.1.22-0.rc1.9.8.ia64",
"4AS:cups-1:1.1.22-0.rc1.9.8.ppc",
"4AS:cups-1:1.1.22-0.rc1.9.8.s390",
"4AS:cups-1:1.1.22-0.rc1.9.8.s390x",
"4AS:cups-1:1.1.22-0.rc1.9.8.src",
"4AS:cups-1:1.1.22-0.rc1.9.8.x86_64",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"4AS:cups-devel-1:1.1.22-0.rc1.9.8.i386",
"4AS:cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"4AS:cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"4AS:cups-devel-1:1.1.22-0.rc1.9.8.s390",
"4AS:cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"4AS:cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.i386",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.s390",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.x86_64",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.i386",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.ia64",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.ppc",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.s390",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.s390x",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.src",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.x86_64",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.i386",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.s390",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.i386",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.s390",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.x86_64",
"4ES:cups-1:1.1.22-0.rc1.9.8.i386",
"4ES:cups-1:1.1.22-0.rc1.9.8.ia64",
"4ES:cups-1:1.1.22-0.rc1.9.8.ppc",
"4ES:cups-1:1.1.22-0.rc1.9.8.s390",
"4ES:cups-1:1.1.22-0.rc1.9.8.s390x",
"4ES:cups-1:1.1.22-0.rc1.9.8.src",
"4ES:cups-1:1.1.22-0.rc1.9.8.x86_64",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"4ES:cups-devel-1:1.1.22-0.rc1.9.8.i386",
"4ES:cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"4ES:cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"4ES:cups-devel-1:1.1.22-0.rc1.9.8.s390",
"4ES:cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"4ES:cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.i386",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.s390",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.x86_64",
"4WS:cups-1:1.1.22-0.rc1.9.8.i386",
"4WS:cups-1:1.1.22-0.rc1.9.8.ia64",
"4WS:cups-1:1.1.22-0.rc1.9.8.ppc",
"4WS:cups-1:1.1.22-0.rc1.9.8.s390",
"4WS:cups-1:1.1.22-0.rc1.9.8.s390x",
"4WS:cups-1:1.1.22-0.rc1.9.8.src",
"4WS:cups-1:1.1.22-0.rc1.9.8.x86_64",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"4WS:cups-devel-1:1.1.22-0.rc1.9.8.i386",
"4WS:cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"4WS:cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"4WS:cups-devel-1:1.1.22-0.rc1.9.8.s390",
"4WS:cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"4WS:cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.i386",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.s390",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-2874"
},
{
"category": "external",
"summary": "RHBZ#1617763",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617763"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2874"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2874",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2874"
}
],
"release_date": "2005-01-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2005-09-27T11:53:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/",
"product_ids": [
"4AS:cups-1:1.1.22-0.rc1.9.8.i386",
"4AS:cups-1:1.1.22-0.rc1.9.8.ia64",
"4AS:cups-1:1.1.22-0.rc1.9.8.ppc",
"4AS:cups-1:1.1.22-0.rc1.9.8.s390",
"4AS:cups-1:1.1.22-0.rc1.9.8.s390x",
"4AS:cups-1:1.1.22-0.rc1.9.8.src",
"4AS:cups-1:1.1.22-0.rc1.9.8.x86_64",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"4AS:cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"4AS:cups-devel-1:1.1.22-0.rc1.9.8.i386",
"4AS:cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"4AS:cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"4AS:cups-devel-1:1.1.22-0.rc1.9.8.s390",
"4AS:cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"4AS:cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.i386",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.s390",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"4AS:cups-libs-1:1.1.22-0.rc1.9.8.x86_64",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.i386",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.ia64",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.ppc",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.s390",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.s390x",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.src",
"4Desktop:cups-1:1.1.22-0.rc1.9.8.x86_64",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"4Desktop:cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.i386",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.s390",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"4Desktop:cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.i386",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.s390",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"4Desktop:cups-libs-1:1.1.22-0.rc1.9.8.x86_64",
"4ES:cups-1:1.1.22-0.rc1.9.8.i386",
"4ES:cups-1:1.1.22-0.rc1.9.8.ia64",
"4ES:cups-1:1.1.22-0.rc1.9.8.ppc",
"4ES:cups-1:1.1.22-0.rc1.9.8.s390",
"4ES:cups-1:1.1.22-0.rc1.9.8.s390x",
"4ES:cups-1:1.1.22-0.rc1.9.8.src",
"4ES:cups-1:1.1.22-0.rc1.9.8.x86_64",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"4ES:cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"4ES:cups-devel-1:1.1.22-0.rc1.9.8.i386",
"4ES:cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"4ES:cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"4ES:cups-devel-1:1.1.22-0.rc1.9.8.s390",
"4ES:cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"4ES:cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.i386",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.s390",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"4ES:cups-libs-1:1.1.22-0.rc1.9.8.x86_64",
"4WS:cups-1:1.1.22-0.rc1.9.8.i386",
"4WS:cups-1:1.1.22-0.rc1.9.8.ia64",
"4WS:cups-1:1.1.22-0.rc1.9.8.ppc",
"4WS:cups-1:1.1.22-0.rc1.9.8.s390",
"4WS:cups-1:1.1.22-0.rc1.9.8.s390x",
"4WS:cups-1:1.1.22-0.rc1.9.8.src",
"4WS:cups-1:1.1.22-0.rc1.9.8.x86_64",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.i386",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ia64",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.ppc64",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.s390x",
"4WS:cups-debuginfo-1:1.1.22-0.rc1.9.8.x86_64",
"4WS:cups-devel-1:1.1.22-0.rc1.9.8.i386",
"4WS:cups-devel-1:1.1.22-0.rc1.9.8.ia64",
"4WS:cups-devel-1:1.1.22-0.rc1.9.8.ppc",
"4WS:cups-devel-1:1.1.22-0.rc1.9.8.s390",
"4WS:cups-devel-1:1.1.22-0.rc1.9.8.s390x",
"4WS:cups-devel-1:1.1.22-0.rc1.9.8.x86_64",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.i386",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.ia64",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.ppc",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.ppc64",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.s390",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.s390x",
"4WS:cups-libs-1:1.1.22-0.rc1.9.8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2005:772"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "security flaw"
}
]
}
GHSA-R8X3-VMCC-9Q2G
Vulnerability from github – Published: 2022-05-01 02:12 – Updated: 2025-04-03 04:17
VLAI?
Details
The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a "...." URL in an HTTP request.
{
"affected": [],
"aliases": [
"CVE-2005-2874"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2005-09-13T22:03:00Z",
"severity": "MODERATE"
},
"details": "The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a \"..\\..\" URL in an HTTP request.",
"id": "GHSA-r8x3-vmcc-9q2g",
"modified": "2025-04-03T04:17:19Z",
"published": "2022-05-01T02:12:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2874"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774"
},
{
"type": "WEB",
"url": "http://lwn.net/Alerts/152835"
},
{
"type": "WEB",
"url": "http://securitytracker.com/id?1012811"
},
{
"type": "WEB",
"url": "http://www.cups.org/relnotes.php#010123"
},
{
"type": "WEB",
"url": "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2005-772.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2005-2874
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a "..\.." URL in an HTTP request.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2005-2874",
"description": "The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a \"..\\..\" URL in an HTTP request.",
"id": "GSD-2005-2874",
"references": [
"https://www.suse.com/security/cve/CVE-2005-2874.html",
"https://access.redhat.com/errata/RHSA-2005:772"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2005-2874"
],
"details": "The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a \"..\\..\" URL in an HTTP request.",
"id": "GSD-2005-2874",
"modified": "2023-12-13T01:20:10.461667Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-2874",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a \"..\\..\" URL in an HTTP request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lwn.net/Alerts/152835/",
"refsource": "MISC",
"url": "http://lwn.net/Alerts/152835/"
},
{
"name": "http://securitytracker.com/id?1012811",
"refsource": "MISC",
"url": "http://securitytracker.com/id?1012811"
},
{
"name": "http://www.cups.org/relnotes.php#010123",
"refsource": "MISC",
"url": "http://www.cups.org/relnotes.php#010123"
},
{
"name": "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042",
"refsource": "MISC",
"url": "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2005-772.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2005-772.html"
},
{
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.20_rc6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.5_1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.20_rc2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.20_rc3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.22_rc2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.6_1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.6_2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.10_1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.20_rc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.21_rc1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.21_rc2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.5_2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.9_1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.20_rc4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.20_rc5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.6_3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2005-2874"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a \"..\\..\" URL in an HTTP request."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042"
},
{
"name": "http://www.cups.org/relnotes.php#010123",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.cups.org/relnotes.php#010123"
},
{
"name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072",
"refsource": "MISC",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072"
},
{
"name": "1012811",
"refsource": "SECTRACK",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://securitytracker.com/id?1012811"
},
{
"name": "FEDORA-2005-908",
"refsource": "FEDORA",
"tags": [],
"url": "http://lwn.net/Alerts/152835/"
},
{
"name": "RHSA-2005:772",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2005-772.html"
},
{
"name": "oval:org.mitre.oval:def:9774",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-10-11T01:30Z",
"publishedDate": "2005-09-13T22:03Z"
}
}
}
FKIE_CVE-2005-2874
Vulnerability from fkie_nvd - Published: 2005-09-13 22:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a "..\.." URL in an HTTP request.
References
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lwn.net/Alerts/152835/ | ||
| secalert@redhat.com | http://securitytracker.com/id?1012811 | Exploit, Patch, Vendor Advisory | |
| secalert@redhat.com | http://www.cups.org/relnotes.php#010123 | ||
| secalert@redhat.com | http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042 | Vendor Advisory | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2005-772.html | ||
| secalert@redhat.com | https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072 | Exploit, Patch, Vendor Advisory | |
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lwn.net/Alerts/152835/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1012811 | Exploit, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.cups.org/relnotes.php#010123 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2005-772.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072 | Exploit, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774 |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| easy_software_products | cups | 1.1 | |
| easy_software_products | cups | 1.1.1 | |
| easy_software_products | cups | 1.1.2 | |
| easy_software_products | cups | 1.1.3 | |
| easy_software_products | cups | 1.1.4 | |
| easy_software_products | cups | 1.1.5 | |
| easy_software_products | cups | 1.1.5_1 | |
| easy_software_products | cups | 1.1.5_2 | |
| easy_software_products | cups | 1.1.6 | |
| easy_software_products | cups | 1.1.6_1 | |
| easy_software_products | cups | 1.1.6_2 | |
| easy_software_products | cups | 1.1.6_3 | |
| easy_software_products | cups | 1.1.7 | |
| easy_software_products | cups | 1.1.8 | |
| easy_software_products | cups | 1.1.9 | |
| easy_software_products | cups | 1.1.9_1 | |
| easy_software_products | cups | 1.1.10 | |
| easy_software_products | cups | 1.1.10_1 | |
| easy_software_products | cups | 1.1.11 | |
| easy_software_products | cups | 1.1.12 | |
| easy_software_products | cups | 1.1.13 | |
| easy_software_products | cups | 1.1.14 | |
| easy_software_products | cups | 1.1.15 | |
| easy_software_products | cups | 1.1.16 | |
| easy_software_products | cups | 1.1.17 | |
| easy_software_products | cups | 1.1.18 | |
| easy_software_products | cups | 1.1.19 | |
| easy_software_products | cups | 1.1.19_rc1 | |
| easy_software_products | cups | 1.1.19_rc2 | |
| easy_software_products | cups | 1.1.19_rc3 | |
| easy_software_products | cups | 1.1.19_rc4 | |
| easy_software_products | cups | 1.1.19_rc5 | |
| easy_software_products | cups | 1.1.20 | |
| easy_software_products | cups | 1.1.20_rc1 | |
| easy_software_products | cups | 1.1.20_rc2 | |
| easy_software_products | cups | 1.1.20_rc3 | |
| easy_software_products | cups | 1.1.20_rc4 | |
| easy_software_products | cups | 1.1.20_rc5 | |
| easy_software_products | cups | 1.1.20_rc6 | |
| easy_software_products | cups | 1.1.21 | |
| easy_software_products | cups | 1.1.21_rc1 | |
| easy_software_products | cups | 1.1.21_rc2 | |
| easy_software_products | cups | 1.1.22 | |
| easy_software_products | cups | 1.1.22_rc1 | |
| easy_software_products | cups | 1.1.22_rc2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A40BA21C-4F77-4BB3-A75C-A84FD0A752C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FCF4C8D0-3030-4DD5-800B-76A582A4CD0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "75DE26A5-D9EB-4C89-944D-D1C69C6E7FEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E747A07-0E8C-494F-BF0C-5B18EC0AC742",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "734D0C2C-F71F-461A-87EE-202C6B706753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "67C5DDB0-335F-454F-A672-038E2E095B78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.5_1:*:*:*:*:*:*:*",
"matchCriteriaId": "9F8C59BA-5D45-44D6-BFA4-0609EC6B19DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.5_2:*:*:*:*:*:*:*",
"matchCriteriaId": "291C3E28-19C2-4C01-B52A-AB6A674822AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.6_1:*:*:*:*:*:*:*",
"matchCriteriaId": "13F87630-EF23-4F24-AB07-61A8933DE273",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.6_2:*:*:*:*:*:*:*",
"matchCriteriaId": "BE6ECE2C-C09C-435B-A856-4A097CFFEFDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.6_3:*:*:*:*:*:*:*",
"matchCriteriaId": "87643004-E24E-494E-A56D-95D1DA05C97B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "35E65857-12C7-49DE-AD27-3CACD456231C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "18B86105-0B9B-459D-9742-EBA7E02BC3BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "BF3BE0A1-C73E-4572-9FCF-F069354F9803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.9_1:*:*:*:*:*:*:*",
"matchCriteriaId": "E128DAF6-FB24-4F3E-8462-1B751B2F21C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "47CEF035-57A6-470B-916A-E5562C28E866",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.10_1:*:*:*:*:*:*:*",
"matchCriteriaId": "9CE113D7-9680-4E60-A9D1-AF531F82A35D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F338B2C9-167B-4F2E-883A-2315660B24E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "4E26BB15-4CF8-4496-A7F7-EB34C444EF72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "D414984E-4F6B-4278-8346-968587E4B18E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "33C36DCB-2FDD-44E6-85E8-875575AAE69E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7C4B7C23-0C54-4FBA-A774-9CC1E148376E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9FA0EF14-33E6-4D44-B86E-F04014EA3C8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "A786A770-919E-4E23-949D-D836F316618A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "00A2249C-73DE-434E-A41F-4EDB0ADC0845",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "176617A7-C4B8-4411-BF53-8F1224166490",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "AAC31855-304C-423F-B186-9BFACDE9E34B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc3:*:*:*:*:*:*:*",
"matchCriteriaId": "35A80DC4-6443-4204-B297-EB208A12EA3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc4:*:*:*:*:*:*:*",
"matchCriteriaId": "97A74F20-FE2D-42B1-86C6-0D030CA16CF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*",
"matchCriteriaId": "73AB4D3D-FF35-4A50-A144-3AD41F6F2E55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "FB7653F1-70E2-423F-A6A9-30333644B506",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.20_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "274916CC-03CC-4E8C-9CF3-8B3A5F630604",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.20_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "5BE0846C-B97E-428E-B1F8-E336BDAEFC58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.20_rc3:*:*:*:*:*:*:*",
"matchCriteriaId": "D22AE1B0-257F-4B2C-B280-1A1AE1DCE0D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.20_rc4:*:*:*:*:*:*:*",
"matchCriteriaId": "89E17EC9-047F-4644-B839-F01C109D3CB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.20_rc5:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C3628B-2272-4D39-BDF5-7D785933A71D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.20_rc6:*:*:*:*:*:*:*",
"matchCriteriaId": "98F27B48-A422-462E-BD61-561347870B51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2406EA53-15E7-4CFE-850B-D3CF3FA8560A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.21_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "BA2D30B5-C9A5-4549-B8F0-AD541C9CDFA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.21_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "9644EB8E-66D0-4D2F-9FCE-9F226E4FE70E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "B1512A96-B8E7-4DB7-A4CB-8FD3773BFC97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*",
"matchCriteriaId": "787B918D-9CCC-44FE-92AF-E8DF1E91A3C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:easy_software_products:cups:1.1.22_rc2:*:*:*:*:*:*:*",
"matchCriteriaId": "6F875BE5-7F09-4AAC-AA84-3F88106E4E0C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a \"..\\..\" URL in an HTTP request."
}
],
"id": "CVE-2005-2874",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-09-13T22:03:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://lwn.net/Alerts/152835/"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://securitytracker.com/id?1012811"
},
{
"source": "secalert@redhat.com",
"url": "http://www.cups.org/relnotes.php#010123"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2005-772.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lwn.net/Alerts/152835/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "http://securitytracker.com/id?1012811"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.cups.org/relnotes.php#010123"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2005-772.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…