openSUSE Security Update : cups (openSUSE-2015-418)

critical Nessus Plugin ID 84184

Synopsis

The remote openSUSE host is missing a security update.

Description

This update fixes the following issues :

- CVE-2015-1158 and CVE-2015-1159 fixes a possible privilege escalation via cross-site scripting and bad print job submission used to replace cupsd.conf on server (CUPS STR#4609 CERT-VU-810572 CVE-2015-1158 CVE-2015-1159 bugzilla.suse.com bsc#924208). In general it is crucial to limit access to CUPS to trustworthy users who do not misuse their permission to submit print jobs which means to upload arbitrary data onto the CUPS server, see https://en.opensuse.org/SDB:CUPS_and_SANE_Firewall_setti ngs and cf. the entries about CVE-2012-5519 below.

Solution

Update the affected cups packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=924208

https://en.opensuse.org/SDB:CUPS_and_SANE_Firewall_settings

Plugin Details

Severity: Critical

ID: 84184

File Name: openSUSE-2015-418.nasl

Version: 2.4

Type: local

Agent: unix

Published: 6/15/2015

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:cups, p-cpe:/a:novell:opensuse:cups-client, p-cpe:/a:novell:opensuse:cups-client-debuginfo, p-cpe:/a:novell:opensuse:cups-ddk, p-cpe:/a:novell:opensuse:cups-ddk-debuginfo, p-cpe:/a:novell:opensuse:cups-debuginfo, p-cpe:/a:novell:opensuse:cups-debugsource, p-cpe:/a:novell:opensuse:cups-devel, p-cpe:/a:novell:opensuse:cups-libs, p-cpe:/a:novell:opensuse:cups-libs-32bit, p-cpe:/a:novell:opensuse:cups-libs-debuginfo, p-cpe:/a:novell:opensuse:cups-libs-debuginfo-32bit, cpe:/o:novell:opensuse:13.1, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 6/10/2015

Reference Information

CVE: CVE-2012-5519, CVE-2015-1158, CVE-2015-1159