First published: Wed Apr 02 2014(Updated: )
cups-browsed in cups-filters 1.0.41 before 1.0.51 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the (1) model or (2) PDL, related to "System V interface scripts generated for queues."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/cups-filters | <1.0.51 | 1.0.51 |
CUPS Filters | =1.0.41 | |
CUPS Filters | =1.0.42 | |
CUPS Filters | =1.0.43 | |
CUPS Filters | =1.0.44 | |
CUPS Filters | =1.0.45 | |
CUPS Filters | =1.0.46 | |
CUPS Filters | =1.0.47 | |
CUPS Filters | =1.0.48 | |
CUPS Filters | =1.0.49 | |
CUPS Filters | =1.0.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2707 has a high severity rating due to its ability to allow remote IPP printers to execute arbitrary commands.
To fix CVE-2014-2707, upgrade the cups-filters package to version 1.0.51 or later.
CVE-2014-2707 affects cups-filters versions from 1.0.41 to 1.0.50.
The impact of CVE-2014-2707 is the potential execution of arbitrary commands on the system, which poses a significant security risk.
The Linux Foundation is responsible for releasing updates to the cups-filters package that address CVE-2014-2707.