Mandriva Linux Security Advisory : cups (MDVSA-2014:151)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

Updated cups packages fix security vulnerability :

In CUPS before 1.7.4, a local user with privileges of group=lp can
write symbolic links in the rss directory and use that to gain
'@SYSTEM' group privilege with cupsd (CVE-2014-3537).

It was discovered that the web interface in CUPS incorrectly validated
permissions on rss files and directory index files. A local attacker
could possibly use this issue to bypass file permissions and read
arbitrary files, possibly leading to a privilege escalation
(CVE-2014-5029, CVE-2014-5030, CVE-2014-5031).

See also :

http://advisories.mageia.org/MGASA-2014-0313.html

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Mandriva Local Security Checks

Nessus Plugin ID: 77039 ()

Bugtraq ID: 68788
68842
68846
68847

CVE ID: CVE-2014-3537
CVE-2014-5029
CVE-2014-5030
CVE-2014-5031

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now