First published: Fri Apr 04 2014(Updated: )
It was reported that ANSI escape sequences could be added to printer names in CUPS. Becaue CUPS has a browsing feature that, when enabled, allows remote hosts to announce shared printers, a malicious host or user could send a specially-crafted UDP packet to a CUPS server announcing an arbitrary printer name that includes ANSI escape sequences. Since the CUPS daemon does not remove these characters, a user on the targeted system could query the printer list (using 'lpstat -a', for example). If this were done in a terminal that supported the ANSI escape sequences (like a terminal with support for color), then code execution could be possible as the terminal would interpret the ANSI escape sequences contained in the printer name.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS libraries | <1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8166 is classified as a medium severity vulnerability.
To fix CVE-2014-8166, update CUPS to version 1.6 or later.
CVE-2014-8166 affects systems running CUPS versions below 1.6.
CVE-2014-8166 can be exploited by a malicious user sending specially-crafted UDP packets to announce arbitrary printer names.
Yes, the vulnerability is related to the CUPS browsing feature that allows remote hosts to announce shared printers.