{"api_version":"1","generated_at":"2026-04-22T23:21:51+00:00","cve":"CVE-2005-2874","urls":{"html":"https://cve.report/CVE-2005-2874","api":"https://cve.report/api/cve/CVE-2005-2874.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-2874","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-2874"},"summary":{"title":"CVE-2005-2874","description":"The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a \"..\\..\" URL in an HTTP request.","state":"PUBLISHED","assigner":"redhat","published_at":"2005-09-13 22:03:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:N/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.redhat.com/support/errata/RHSA-2005-772.html","name":"http://www.redhat.com/support/errata/RHSA-2005-772.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lwn.net/Alerts/152835/","name":"http://lwn.net/Alerts/152835/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Fedora alert FEDORA-2005-908 (cups) [LWN.net]","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072","name":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"],"title":"168072 – CAN-2005-2874 Malformed HTTP Request URL denial of service","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.cups.org/relnotes.php#010123","name":"http://www.cups.org/relnotes.php#010123","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Release Notes - Common UNIX Printing System","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042","name":"http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"STR866 fix introduces DoS · Issue #1042 · apple/cups · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1012811","name":"http://securitytracker.com/id?1012811","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"],"title":"SecurityTracker.com Archives - CUPS Logic Error in Processing '/..' Requests Lets Remote Users Deny Service","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-2874","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2874","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.10_1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.13","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.14","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.15","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.16","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.17","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.18","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.19","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.19_rc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.19_rc2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.19_rc3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.19_rc4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.19_rc5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.20","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.20_rc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.20_rc2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.20_rc3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.20_rc4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.20_rc5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.20_rc6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.21","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.21_rc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.21_rc2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.22","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.22_rc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.22_rc2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.5_1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.5_2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.6_1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.6_2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.6_3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2874","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"easy_software_products","cpe5":"cups","cpe6":"1.1.9_1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T22:53:29.901Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"FEDORA-2005-908","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://lwn.net/Alerts/152835/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.cups.org/relnotes.php#010123"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072"},{"name":"1012811","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1012811"},{"name":"RHSA-2005:772","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2005-772.html"},{"name":"oval:org.mitre.oval:def:9774","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-01-07T00:00:00.000Z","descriptions":[{"lang":"en","value":"The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a \"..\\..\" URL in an HTTP request."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-10-10T00:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"FEDORA-2005-908","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://lwn.net/Alerts/152835/"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.cups.org/relnotes.php#010123"},{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168072"},{"name":"1012811","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1012811"},{"name":"RHSA-2005:772","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2005-772.html"},{"name":"oval:org.mitre.oval:def:9774","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9774"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042"}]}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2005-2874","datePublished":"2005-09-13T04:00:00.000Z","dateReserved":"2005-09-13T00:00:00.000Z","dateUpdated":"2024-08-07T22:53:29.901Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-09-13 22:03:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1:*:*:*:*:*:*:*","matchCriteriaId":"A40BA21C-4F77-4BB3-A75C-A84FD0A752C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"FCF4C8D0-3030-4DD5-800B-76A582A4CD0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.2:*:*:*:*:*:*:*","matchCriteriaId":"75DE26A5-D9EB-4C89-944D-D1C69C6E7FEB"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.3:*:*:*:*:*:*:*","matchCriteriaId":"1E747A07-0E8C-494F-BF0C-5B18EC0AC742"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.4:*:*:*:*:*:*:*","matchCriteriaId":"734D0C2C-F71F-461A-87EE-202C6B706753"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.5:*:*:*:*:*:*:*","matchCriteriaId":"67C5DDB0-335F-454F-A672-038E2E095B78"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.5_1:*:*:*:*:*:*:*","matchCriteriaId":"9F8C59BA-5D45-44D6-BFA4-0609EC6B19DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.5_2:*:*:*:*:*:*:*","matchCriteriaId":"291C3E28-19C2-4C01-B52A-AB6A674822AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.6:*:*:*:*:*:*:*","matchCriteriaId":"1741CC9D-C4A8-48F9-86CF-EC20AE2A6BE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.6_1:*:*:*:*:*:*:*","matchCriteriaId":"13F87630-EF23-4F24-AB07-61A8933DE273"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.6_2:*:*:*:*:*:*:*","matchCriteriaId":"BE6ECE2C-C09C-435B-A856-4A097CFFEFDE"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.6_3:*:*:*:*:*:*:*","matchCriteriaId":"87643004-E24E-494E-A56D-95D1DA05C97B"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.7:*:*:*:*:*:*:*","matchCriteriaId":"35E65857-12C7-49DE-AD27-3CACD456231C"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.8:*:*:*:*:*:*:*","matchCriteriaId":"18B86105-0B9B-459D-9742-EBA7E02BC3BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.9:*:*:*:*:*:*:*","matchCriteriaId":"BF3BE0A1-C73E-4572-9FCF-F069354F9803"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.9_1:*:*:*:*:*:*:*","matchCriteriaId":"E128DAF6-FB24-4F3E-8462-1B751B2F21C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.10:*:*:*:*:*:*:*","matchCriteriaId":"47CEF035-57A6-470B-916A-E5562C28E866"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.10_1:*:*:*:*:*:*:*","matchCriteriaId":"9CE113D7-9680-4E60-A9D1-AF531F82A35D"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.11:*:*:*:*:*:*:*","matchCriteriaId":"F338B2C9-167B-4F2E-883A-2315660B24E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.12:*:*:*:*:*:*:*","matchCriteriaId":"4E26BB15-4CF8-4496-A7F7-EB34C444EF72"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.13:*:*:*:*:*:*:*","matchCriteriaId":"D414984E-4F6B-4278-8346-968587E4B18E"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.14:*:*:*:*:*:*:*","matchCriteriaId":"33C36DCB-2FDD-44E6-85E8-875575AAE69E"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.15:*:*:*:*:*:*:*","matchCriteriaId":"7C4B7C23-0C54-4FBA-A774-9CC1E148376E"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.16:*:*:*:*:*:*:*","matchCriteriaId":"9FA0EF14-33E6-4D44-B86E-F04014EA3C8F"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.17:*:*:*:*:*:*:*","matchCriteriaId":"A5428EE6-F90A-4BB6-9D8C-8B99E80AB6DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.18:*:*:*:*:*:*:*","matchCriteriaId":"A786A770-919E-4E23-949D-D836F316618A"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.19:*:*:*:*:*:*:*","matchCriteriaId":"00A2249C-73DE-434E-A41F-4EDB0ADC0845"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.19_rc1:*:*:*:*:*:*:*","matchCriteriaId":"176617A7-C4B8-4411-BF53-8F1224166490"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.19_rc2:*:*:*:*:*:*:*","matchCriteriaId":"AAC31855-304C-423F-B186-9BFACDE9E34B"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.19_rc3:*:*:*:*:*:*:*","matchCriteriaId":"35A80DC4-6443-4204-B297-EB208A12EA3E"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.19_rc4:*:*:*:*:*:*:*","matchCriteriaId":"97A74F20-FE2D-42B1-86C6-0D030CA16CF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.19_rc5:*:*:*:*:*:*:*","matchCriteriaId":"73AB4D3D-FF35-4A50-A144-3AD41F6F2E55"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.20:*:*:*:*:*:*:*","matchCriteriaId":"FB7653F1-70E2-423F-A6A9-30333644B506"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.20_rc1:*:*:*:*:*:*:*","matchCriteriaId":"274916CC-03CC-4E8C-9CF3-8B3A5F630604"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.20_rc2:*:*:*:*:*:*:*","matchCriteriaId":"5BE0846C-B97E-428E-B1F8-E336BDAEFC58"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.20_rc3:*:*:*:*:*:*:*","matchCriteriaId":"D22AE1B0-257F-4B2C-B280-1A1AE1DCE0D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.20_rc4:*:*:*:*:*:*:*","matchCriteriaId":"89E17EC9-047F-4644-B839-F01C109D3CB5"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.20_rc5:*:*:*:*:*:*:*","matchCriteriaId":"B8C3628B-2272-4D39-BDF5-7D785933A71D"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.20_rc6:*:*:*:*:*:*:*","matchCriteriaId":"98F27B48-A422-462E-BD61-561347870B51"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.21:*:*:*:*:*:*:*","matchCriteriaId":"2406EA53-15E7-4CFE-850B-D3CF3FA8560A"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.21_rc1:*:*:*:*:*:*:*","matchCriteriaId":"BA2D30B5-C9A5-4549-B8F0-AD541C9CDFA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.21_rc2:*:*:*:*:*:*:*","matchCriteriaId":"9644EB8E-66D0-4D2F-9FCE-9F226E4FE70E"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.22:*:*:*:*:*:*:*","matchCriteriaId":"B1512A96-B8E7-4DB7-A4CB-8FD3773BFC97"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.22_rc1:*:*:*:*:*:*:*","matchCriteriaId":"787B918D-9CCC-44FE-92AF-E8DF1E91A3C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:easy_software_products:cups:1.1.22_rc2:*:*:*:*:*:*:*","matchCriteriaId":"6F875BE5-7F09-4AAC-AA84-3F88106E4E0C"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"2874","Ordinal":"1","Title":"CVE-2005-2874","CVE":"CVE-2005-2874","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"2874","Ordinal":"1","NoteData":"The is_path_absolute function in scheduler/client.c for the daemon in CUPS before 1.1.23 allows remote attackers to cause a denial of service (CPU consumption by tight loop) via a \"..\\..\" URL in an HTTP request.","Type":"Description","Title":"CVE-2005-2874"},{"CveYear":"2005","CveId":"2874","Ordinal":"2","NoteData":"2005-09-13","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"2874","Ordinal":"3","NoteData":"2017-10-09","Type":"Other","Title":"Modified"}]}}}