Executive Summary

Informations
Name CVE-2014-4338 First vendor Publication 2014-06-22
Vendor Cve Last vendor Modification 2018-01-08

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:N)
Cvss Base Score 4 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity High
Cvss Expoit Score 4.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

cups-browsed in cups-filters before 1.0.53 allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a malformed cups-browsed.conf BrowseAllow directive that is interpreted as granting browse access to all IP addresses.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4338

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:26296
 
Oval ID: oval:org.mitre.oval:def:26296
Title: ELSA-2014-1795 -- cups-filters security update (moderate)
Description: [1.0.35-15:.1] - Applied upstream patch to fix BrowseAllow parsing issue (CVE-2014-4338, bug #1091568). - Applied upstream patch for cups-browsed DoS via process_browse_data() out-of-bounds read (CVE-2014-4337, bug #1111510).
Family: unix Class: patch
Reference(s): ELSA-2014-1795
CVE-2014-4337
CVE-2014-4338
Version: 3
Platform(s): Oracle Linux 7
Product(s): cups-filters
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:28375
 
Oval ID: oval:org.mitre.oval:def:28375
Title: RHSA-2014:1795 -- cups-filters security update (Moderate)
Description: The cups-filters package contains backends, filters, and other software that was once part of the core CUPS distribution but is now maintained independently. An out-of-bounds read flaw was found in the way the process_browse_data() function of cups-browsed handled certain browse packets. A remote attacker could send a specially crafted browse packet that, when processed by cups-browsed, would crash the cups-browsed daemon. (CVE-2014-4337) A flaw was found in the way the cups-browsed daemon interpreted the "BrowseAllow" directive in the cups-browsed.conf file. An attacker able to add a malformed "BrowseAllow" directive to the cups-browsed.conf file could use this flaw to bypass intended access restrictions. (CVE-2014-4338) All cups-filters users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the cups-browsed daemon will be restarted automatically.
Family: unix Class: patch
Reference(s): RHSA-2014:1795
CESA-2014:1795
CVE-2014-4337
CVE-2014-4338
Version: 3
Platform(s): Red Hat Enterprise Linux 7
CentOS Linux 7
Product(s): cups-filters
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 54

Nessus® Vulnerability Scanner

Date Description
2015-03-30 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-100.nasl - Type : ACT_GATHER_INFO
2014-11-05 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-1795.nasl - Type : ACT_GATHER_INFO
2014-11-04 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-1795.nasl - Type : ACT_GATHER_INFO
2014-11-04 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1795.nasl - Type : ACT_GATHER_INFO
2014-11-04 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20141103_cups_filters_on_SL7_x.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/68124
CONFIRM https://bugs.linuxfoundation.org/show_bug.cgi?id=1204
MLIST http://openwall.com/lists/oss-security/2014/04/25/7
http://openwall.com/lists/oss-security/2014/06/19/12
REDHAT http://rhn.redhat.com/errata/RHSA-2014-1795.html
SECUNIA http://secunia.com/advisories/62044

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
Date Informations
2023-05-26 01:20:32
  • Multiple Updates
2021-05-05 01:15:28
  • Multiple Updates
2021-05-04 12:32:39
  • Multiple Updates
2021-04-22 01:39:52
  • Multiple Updates
2020-05-23 01:52:27
  • Multiple Updates
2020-05-23 00:41:25
  • Multiple Updates
2018-01-08 21:20:34
  • Multiple Updates
2018-01-05 12:05:02
  • Multiple Updates
2018-01-04 12:05:27
  • Multiple Updates
2016-11-29 00:24:55
  • Multiple Updates
2016-04-27 00:58:49
  • Multiple Updates
2015-12-05 13:26:38
  • Multiple Updates
2015-11-25 13:26:44
  • Multiple Updates
2015-03-31 13:28:40
  • Multiple Updates
2014-11-14 13:28:30
  • Multiple Updates
2014-11-06 13:28:22
  • Multiple Updates
2014-11-05 13:27:56
  • Multiple Updates
2014-06-23 21:22:44
  • Multiple Updates
2014-06-23 05:24:49
  • First insertion