Lucene search

K
f5F5F5:K16794
HistoryJun 23, 2015 - 12:00 a.m.

K16794 : CUPS vulnerabilities CVE-2015-1158 / CVE-2015-1159

2015-06-2300:00:00
my.f5.com
4

6.3 Medium

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.937 High

EPSS

Percentile

98.9%

Security Advisory Description

Description

A string reference count bug was found in cupsd, causing premature freeing of string objects. An attacker can submit a malicious print job that exploits this flaw to dismantle ACLs protecting privileged operations, allowing a replacement configuration file to be uploaded, which in turn allows the attacker to run arbitrary code on the CUPS server.

A cross-site scripting bug in the CUPS templating engine allows this bug to be exploited when a user browses the web.

Impact

There is no impact. No F5 products are affected by these vulnerabilities.

Status

To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:

Product Versions known to be vulnerable Versions known to be not vulnerable Severity Vulnerable component or feature
BIG-IP LTM None
11.0.0 - 11.6.0
10.0.0 - 10.2.4

| Not vulnerable| None
BIG-IP AAM| None| 11.4.0 - 11.6.0
| Not vulnerable| None
BIG-IP AFM| None| 11.3.0 - 11.6.0
| Not vulnerable| None
BIG-IP Analytics| None| 11.0.0 - 11.6.0
| Not vulnerable| None
BIG-IP APM| None| 11.0.0 - 11.6.0
10.1.0 - 10.2.4
| Not vulnerable| None
BIG-IP ASM| None| 11.0.0 - 11.6.0
10.0.0 - 10.2.4
| Not vulnerable| None
BIG-IP Edge Gateway
| None| 11.0.0 - 11.3.0
10.1.0 - 10.2.4
| Not vulnerable| None
BIG-IP GTM| None| 11.0.0 - 11.6.0
10.0.0 - 10.2.4
| Not vulnerable| None
BIG-IP Link Controller| None
| 11.0.0 - 11.6.0
10.0.0 - 10.2.4
| Not vulnerable| None
BIG-IP PEM| None
| 11.3.0 - 11.6.0
| Not vulnerable| None
BIG-IP PSM| None| 11.0.0 - 11.4.1
10.0.0 - 10.2.4
| Not vulnerable| None
BIG-IP WebAccelerator| None| 11.0.0 - 11.3.0
10.0.0 - 10.2.4
| Not vulnerable| None
BIG-IP WOM| None| 11.0.0 - 11.3.0
10.0.0 - 10.2.4
| Not vulnerable| None
ARX| None| 6.0.0 - 6.4.0
| Not vulnerable| None
Enterprise Manager| None| 3.0.0 - 3.1.1
2.1.0 - 2.3.0
| Not vulnerable| None
FirePass| None| 7.0.0
6.0.0 - 6.1.0
| Not vulnerable| None
BIG-IQ Cloud| None
| 4.0.0 - 4.5.0
| Not vulnerable| None
BIG-IQ Device| None
| 4.2.0 - 4.5.0
| Not vulnerable| None
BIG-IQ Security| None
| 4.0.0 - 4.5.0
| Not vulnerable| None
BIG-IQ ADC| None
| 4.5.0
| Not vulnerable| None
LineRate| None
| 2.5.0 - 2.6.0
| Not vulnerable| None
F5 WebSafe| None
| 1.0.0
| Not vulnerable| None
Traffix SDC| None
| 4.0.0 - 4.4.0
3.3.2 - 3.5.1
| Not vulnerable| None

Note: As of February 17, 2015, AskF5 Security Advisory articles include the Severity value. Security Advisory articles published before this date do not list a Severity value.

Recommended Action

None

Supplemental Information

6.3 Medium

AI Score

Confidence

High

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.937 High

EPSS

Percentile

98.9%