CUPS 1.7.x < 1.7.5 'get_file' Function Symlink Handling Info Disclosure

This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.


Synopsis :

The remote print service is potentially affected by an information
disclosure vulnerability.

Description :

According to its banner, the version of CUPS installed on the remote
host is 1.7.x prior to 1.7.5. It is, therefore, potentially affected
by an information disclosure vulnerability that was incompletely
corrected by the fix for CVE-2014-3537.

A flaw exists in the 'get_file' function within the file
'scheduler/client.c' regarding the handling of symlinks. This could
allow a local attacker to cause normally protected files to be
accessible via the web interface.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.

See also :

https://cups.org/blog.php?L725
https://cups.org/str.php?L4455
http://seclists.org/oss-sec/2014/q3/220

Solution :

Either upgrade to CUPS version 1.7.5 or later, or apply the vendor
patch.

Risk factor :

Medium / CVSS Base Score : 4.4
(CVSS2#AV:L/AC:M/Au:S/C:C/I:N/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 77149 ()

Bugtraq ID: 68788
68842
68846
68847

CVE ID: CVE-2014-3537
CVE-2014-5029
CVE-2014-5030
CVE-2014-5031

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now