CUPS 1.7.x < 1.7.4 'get_file' Function Symlink Handling Info Disclosure

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.


Synopsis :

The remote print service is potentially affected by an information
disclosure vulnerability.

Description :

According to its banner, the version of CUPS installed on the remote
host is 1.7.x prior to 1.7.4. It is, therefore, potentially affected
by an information disclosure vulnerability.

A flaw exists in the 'get_file' function within the file
'scheduler/client.c' regarding the handling of symlinks. This could
allow a local attacker to cause normally protected files to be
accessible via the web interface.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.

See also :

http://www.cups.org/blog.php?L724
https://cups.org/str.php?L4450
https://cups.org/strfiles.php/3363/str4450.patch

Solution :

Either upgrade to CUPS version 1.7.4 or later, or apply the vendor
patch.

Risk factor :

Medium / CVSS Base Score : 4.4
(CVSS2#AV:L/AC:M/Au:S/C:C/I:N/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 76936 ()

Bugtraq ID: 68788

CVE ID: CVE-2014-3537

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now