Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-4338 | First vendor Publication | 2014-06-22 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4 | Attack Range | Network |
Cvss Impact Score | 4.9 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
cups-browsed in cups-filters before 1.0.53 allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a malformed cups-browsed.conf BrowseAllow directive that is interpreted as granting browse access to all IP addresses. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4338 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:26296 | |||
Oval ID: | oval:org.mitre.oval:def:26296 | ||
Title: | ELSA-2014-1795 -- cups-filters security update (moderate) | ||
Description: | [1.0.35-15:.1] - Applied upstream patch to fix BrowseAllow parsing issue (CVE-2014-4338, bug #1091568). - Applied upstream patch for cups-browsed DoS via process_browse_data() out-of-bounds read (CVE-2014-4337, bug #1111510). | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-1795 CVE-2014-4337 CVE-2014-4338 | Version: | 3 |
Platform(s): | Oracle Linux 7 | Product(s): | cups-filters |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:28375 | |||
Oval ID: | oval:org.mitre.oval:def:28375 | ||
Title: | RHSA-2014:1795 -- cups-filters security update (Moderate) | ||
Description: | The cups-filters package contains backends, filters, and other software that was once part of the core CUPS distribution but is now maintained independently. An out-of-bounds read flaw was found in the way the process_browse_data() function of cups-browsed handled certain browse packets. A remote attacker could send a specially crafted browse packet that, when processed by cups-browsed, would crash the cups-browsed daemon. (CVE-2014-4337) A flaw was found in the way the cups-browsed daemon interpreted the "BrowseAllow" directive in the cups-browsed.conf file. An attacker able to add a malformed "BrowseAllow" directive to the cups-browsed.conf file could use this flaw to bypass intended access restrictions. (CVE-2014-4338) All cups-filters users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the cups-browsed daemon will be restarted automatically. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:1795 CESA-2014:1795 CVE-2014-4337 CVE-2014-4338 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 7 CentOS Linux 7 | Product(s): | cups-filters |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-03-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-100.nasl - Type : ACT_GATHER_INFO |
2014-11-05 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-1795.nasl - Type : ACT_GATHER_INFO |
2014-11-04 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-1795.nasl - Type : ACT_GATHER_INFO |
2014-11-04 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1795.nasl - Type : ACT_GATHER_INFO |
2014-11-04 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20141103_cups_filters_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:41:24 |
|
2023-05-26 01:20:32 |
|
2021-05-05 01:15:28 |
|
2021-05-04 12:32:39 |
|
2021-04-22 01:39:52 |
|
2020-05-23 01:52:27 |
|
2020-05-23 00:41:25 |
|
2018-01-08 21:20:34 |
|
2018-01-05 12:05:02 |
|
2018-01-04 12:05:27 |
|
2016-11-29 00:24:55 |
|
2016-04-27 00:58:49 |
|
2015-12-05 13:26:38 |
|
2015-11-25 13:26:44 |
|
2015-03-31 13:28:40 |
|
2014-11-14 13:28:30 |
|
2014-11-06 13:28:22 |
|
2014-11-05 13:27:56 |
|
2014-06-23 21:22:44 |
|
2014-06-23 05:24:49 |
|