Lucene search

K
mageiaGentoo FoundationMGASA-2014-0313
HistoryAug 06, 2014 - 12:08 a.m.

Updated cups packages fix security vulnerability

2014-08-0600:08:48
Gentoo Foundation
advisories.mageia.org
12

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

77.0%

In CUPS before 1.7.4, a local user with privileges of group=lp can write symbolic links in the rss directory and use that to gain ‘@SYSTEM’ group privilege with cupsd (CVE-2014-3537). It was discovered that the web interface in CUPS incorrectly validated permissions on rss files and directory index files. A local attacker could possibly use this issue to bypass file permissions and read arbitrary files, possibly leading to a privilege escalation (CVE-2014-5029, CVE-2014-5030, CVE-2014-5031).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchcups< 1.5.4-9.4cups-1.5.4-9.4.mga3
Mageia4noarchcups< 1.7.0-7.3cups-1.7.0-7.3.mga4

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

77.0%