This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Apple First view 2014-07-29
Product Cups Last view 2019-04-03
Version 1.7.4 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:apple:cups

Activity : Overall

Related : CVE

  Date Alert Description
5.9 2019-04-03 CVE-2018-4300

The session cookie generated by the CUPS web interface was easy to guess on Linux, allowing unauthorized scripted access to the web interface when the web interface is enabled. This issue affected versions prior to v2.2.10.

5.3 2018-03-26 CVE-2017-18248

The add_job function in scheduler/ipp.c in CUPS before 2.2.6, when D-Bus support is enabled, can be crashed by remote attackers by sending print jobs with an invalid username, related to a D-Bus notification.

7.5 2018-02-16 CVE-2017-18190

A localhost.localdomain whitelist entry in valid_host() in scheduler/client.c in CUPS before 2.2.2 allows remote attackers to execute arbitrary IPP commands by sending POST requests to the CUPS daemon in conjunction with DNS rebinding. The localhost.localdomain name is often resolved via a DNS server (neither the OS nor the web browser is responsible for ensuring that localhost.localdomain is 127.0.0.1).

6.8 2015-02-19 CVE-2014-9679

Integer underflow in the cupsRasterReadPixels function in filter/raster.c in CUPS before 2.0.2 allows remote attackers to have unspecified impact via a malformed compressed raster file, which triggers a buffer overflow.

5 2014-07-29 CVE-2014-5031

The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.

1.9 2014-07-29 CVE-2014-5030

CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.

1.5 2014-07-29 CVE-2014-5029

The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537.

CWE : Common Weakness Enumeration

%idName
28% (2) CWE-59 Improper Link Resolution Before File Access ('Link Following')
14% (1) CWE-290 Authentication Bypass by Spoofing
14% (1) CWE-264 Permissions, Privileges, and Access Controls
14% (1) CWE-200 Information Exposure
14% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
14% (1) CWE-20 Improper Input Validation

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-10-26 Name: The remote EulerOS Virtualization host is missing multiple security updates.
File: EulerOS_SA-2018-1329.nasl - Type: ACT_GATHER_INFO
2018-07-05 Name: The remote Debian host is missing a security update.
File: debian_DLA-1412.nasl - Type: ACT_GATHER_INFO
2018-05-29 Name: The remote Debian host is missing a security update.
File: debian_DLA-1387.nasl - Type: ACT_GATHER_INFO
2018-05-02 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1080.nasl - Type: ACT_GATHER_INFO
2018-05-02 Name: The remote EulerOS host is missing multiple security updates.
File: EulerOS_SA-2018-1079.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote Fedora host is missing a security update.
File: fedora_2018-ec5f10e626.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote Fedora host is missing a security update.
File: fedora_2018-99f551e4ff.nasl - Type: ACT_GATHER_INFO
2018-02-23 Name: The remote Debian host is missing a security update.
File: debian_DLA-1288.nasl - Type: ACT_GATHER_INFO
2016-07-18 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201607-06.nasl - Type: ACT_GATHER_INFO
2015-07-08 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2015-559.nasl - Type: ACT_GATHER_INFO
2015-06-19 Name: The remote CentOS host is missing one or more security updates.
File: centos_RHSA-2015-1123.nasl - Type: ACT_GATHER_INFO
2015-06-18 Name: The remote Scientific Linux host is missing one or more security updates.
File: sl_20150617_cups_on_SL6_x.nasl - Type: ACT_GATHER_INFO
2015-06-18 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2015-1123.nasl - Type: ACT_GATHER_INFO
2015-06-18 Name: The remote OracleVM host is missing one or more security updates.
File: oraclevm_OVMSA-2015-0071.nasl - Type: ACT_GATHER_INFO
2015-06-18 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2015-1123.nasl - Type: ACT_GATHER_INFO
2015-03-30 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-108.nasl - Type: ACT_GATHER_INFO
2015-03-26 Name: The remote Debian host is missing a security update.
File: debian_DLA-22.nasl - Type: ACT_GATHER_INFO
2015-03-26 Name: The remote Debian host is missing a security update.
File: debian_DLA-159.nasl - Type: ACT_GATHER_INFO
2015-03-24 Name: The remote SuSE 11 host is missing one or more security updates.
File: suse_11_cups-150302.nasl - Type: ACT_GATHER_INFO
2015-03-19 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-049.nasl - Type: ACT_GATHER_INFO
2015-02-27 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-2520-1.nasl - Type: ACT_GATHER_INFO
2015-02-27 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2015-182.nasl - Type: ACT_GATHER_INFO
2015-02-26 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-3172.nasl - Type: ACT_GATHER_INFO
2015-02-23 Name: The remote Fedora host is missing a security update.
File: fedora_2015-2152.nasl - Type: ACT_GATHER_INFO
2015-02-23 Name: The remote Fedora host is missing a security update.
File: fedora_2015-2127.nasl - Type: ACT_GATHER_INFO