Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <201404151636.s3FGa4IS008880@linus.mitre.org>
Date: Tue, 15 Apr 2014 12:36:04 -0400 (EDT)
From: cve-assign@...re.org
To: mmcallis@...hat.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: cross-site scripting issue fixed in CUPS 1.7.2

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> CUPS 1.7.2 ... fixes a cross-site scripting issue

> http://www.cups.org/str.php?L4356
> http://www.cups.org/strfiles.php/3268/str4356.patch
> http://www.cups.org/blog.php?L717
> https://bugs.mageia.org/show_bug.cgi?id=13196

> the patch may not be sufficient to cover all different encodings,
> other special characters of interest etc.

> The attached patch updates is_absolute_path() to check for < and quotes

> if (strchr(path, '<') != NULL || strchr(path, '\"') != NULL || strchr(path, '\'') != NULL)

A CVE can be assigned because the patch above does block some XSS
attack vectors. Use CVE-2014-2856 for what is addressed by this patch.
There weren't any immediate followups here or in L4356 demonstrating
how to exploit the patched scheduler/client.c code in a specific test
environment. It is quite possible that other CVE assignments will be
made later.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTTV86AAoJEKllVAevmvmsoW0H/ijg+KOyofQ2y8V2/AY5amFQ
4+bVg9KcPtyeC6oEMjgx0NAl0UUM3CMQf5q9cWTxA1mkWiFxrfmfavKDwoymxcfl
AlMMOibPCBh+moV4jliWY47eiSolTDF4Bv8spOzbFqkcORUnpcNQwwrD6Q+VUOKn
DuxZUjvStHJhXa2nStIIqThT24B5KQIcRAxUBLKPPuunmhylUi8/UxRxjX6NdPlN
2EL62B3j4VjusYBxOTeq6glNZaeBCoVc3KG7Mvkm5JC0AVH9vcHejQpG35HGnDvX
rD5Q3sbdfhrhJhOEsuYiEAV8e3rHBDxwVYagopf/amaWGOl6/AiwiUIq5mxvIyk=
=bcw3
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.