Executive Summary

Informations
Name CVE-2014-5031 First vendor Publication 2014-07-29
Vendor Cve Last vendor Modification 2017-01-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N)
Cvss Base Score 5 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:25973
 
Oval ID: oval:org.mitre.oval:def:25973
Title: USN-2341-1 -- cups vulnerabilities
Description: CUPS could be made to expose sensitive information, leading to privilege escalation.
Family: unix Class: patch
Reference(s): USN-2341-1
CVE-2014-5029
CVE-2014-5030
CVE-2014-5031
Version: 3
Platform(s): Ubuntu 14.04
Ubuntu 12.04
Ubuntu 10.04
Product(s): cups
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26188
 
Oval ID: oval:org.mitre.oval:def:26188
Title: DSA-2990-1 -- cups - security update
Description: It was discovered that the web interface in CUPS, the Common UNIX Printing System, incorrectly validated permissions on rss files and directory index files. A local attacker could possibly use this issue to bypass file permissions and read arbitrary files, possibly leading to a privilege escalation.
Family: unix Class: patch
Reference(s): DSA-2990-1
CVE-2014-3537
CVE-2014-5029
CVE-2014-5030
CVE-2014-5031
Version: 5
Platform(s): Debian GNU/Linux 7
Debian GNU/kFreeBSD 7
Product(s): cups
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26449
 
Oval ID: oval:org.mitre.oval:def:26449
Title: DEPRECATED: SUSE-SU-2014:1022-1 -- Security update for CUPS
Description: This update fixes various issues in CUPS.
Family: unix Class: patch
Reference(s): SUSE-SU-2014:1022-1
CVE-2014-3537
CVE-2014-5029
CVE-2014-5030
CVE-2014-5031
Version: 4
Platform(s): SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Desktop 11
Product(s): CUPS
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26570
 
Oval ID: oval:org.mitre.oval:def:26570
Title: ELSA-2014-1388 -- cups security and bug fix update
Description: [1:1.4.2-67] - Revert change to whitelist /rss/ resources, as this was not used upstream. [1:1.4.2-66] - More STR #4461 fixes from upstream: make rss feeds world-readable, but cachedir private. - Fix icon display in web interface during server restart (STR #4475). [1:1.4.2-65] - Fixes for upstream patch for STR #4461: allow /rss/ requests for files we created. [1:1.4.2-64] - Use upstream patch for STR #4461. [1:1.4.2-63] - Applied upstream patch to fix CVE-2014-5029 (bug #1122600), CVE-2014-5030 (bug #1128764), CVE-2014-5031 (bug #1128767). - Fix conf/log file reading for authenticated users (STR #4461). [1:1.4.2-62] - Fix CGI handling (STR #4454, bug #1120419). [1:1.4.2-61] - fix patch for CVE-2014-3537 (bug #1117794) [1:1.4.2-60] - CVE-2014-2856: cross-site scripting flaw (bug #1117798) - CVE-2014-3537: insufficient checking leads to privilege escalation (bug #1117794) [1:1.4.2-59] - Removed package description changes. [1:1.4.2-58] - Applied patch to fix 'Bad request' errors as a result of adding in httpSetTimeout (STR #4440, also part of svn revision 9967). [1:1.4.2-57] - Fixed timeout issue with cupsd reading when there is no data ready (bug #1110045). [1:1.4.2-56] - Fixed synconclose patch to avoid 'too many arguments for format' warning. - Fixed settimeout patch to include math.h for fmod declaration. [1:1.4.2-55] - Fixed typo preventing web interface from changing driver (bug #1104483, STR #3601). - Fixed SyncOnClose patch (bug #984883). [1:1.4.2-54] - Use upstream patch to avoid replaying GSS credentials (bug #1040293). [1:1.4.2-53] - Prevent BrowsePoll problems across suspend/resume (bug #769292): - Eliminate indefinite wait for response (svn revision 9688). - Backported httpSetTimeout API function from CUPS 1.5 and use it in the ipp backend so that we wait indefinitely until the printer responds, we get a hard error, or the job is cancelled. - cups-polld: reconnect on error. - Added new SyncOnClose directive to use fsync() after altering configuration files: defaults to 'Yes'. Adjust in cupsd.conf (bug #984883). - Fix cupsctl man page typo (bug #1011076). - Use more portable rpm specfile syntax for conditional php building (bug #988598). - Fix SetEnv directive in cupsd.conf (bug #986495). - Fix 'collection' attribute sending (bug #978387). - Prevent format_log segfault (bug #971079). - Prevent stringpool corruption (bug #884851). - Don't crash when job queued for printer that times out (bug #855431). - Upstream patch for broken multipart handling (bug #852846). - Install /etc/cron.daily/cups with correct permissions (bug #1012482).
Family: unix Class: patch
Reference(s): ELSA-2014-1388
CVE-2014-2856
CVE-2014-3537
CVE-2014-5029
CVE-2014-5030
CVE-2014-5031
Version: 6
Platform(s): Oracle Linux 6
Product(s): cups
cups-devel
cups-libs
cups-lpd
cups-php
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:26696
 
Oval ID: oval:org.mitre.oval:def:26696
Title: SUSE-SU-2014:1022-1 -- Security update for CUPS
Description: This update fixes various issues in CUPS.
Family: unix Class: patch
Reference(s): SUSE-SU-2014:1022-1
CVE-2014-3537
CVE-2014-5029
CVE-2014-5030
CVE-2014-5031
Version: 3
Platform(s): SUSE Linux Enterprise Server 11
SUSE Linux Enterprise Desktop 11
Product(s): CUPS
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:27056
 
Oval ID: oval:org.mitre.oval:def:27056
Title: RHSA-2014:1388: cups security and bug fix update (Moderate)
Description: CUPS provides a portable printing layer for Linux, UNIX, and similar operating systems. A cross-site scripting (XSS) flaw was found in the CUPS web interface. An attacker could use this flaw to perform a cross-site scripting attack against users of the CUPS web interface. (CVE-2014-2856) It was discovered that CUPS allowed certain users to create symbolic links in certain directories under /var/cache/cups/. A local user with the 'lp' group privileges could use this flaw to read the contents of arbitrary files on the system or, potentially, escalate their privileges on the system. (CVE-2014-3537, CVE-2014-5029, CVE-2014-5030, CVE-2014-5031) The CVE-2014-3537 issue was discovered by Francisco Alonso of Red Hat Product Security. These updated cups packages also include several bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 6.6 Technical Notes, linked to in the References section, for information on the most significant of these changes. All cups users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, the cupsd daemon will be restarted automatically.
Family: unix Class: patch
Reference(s): RHSA-2014:1388-01
CVE-2014-2856
CVE-2014-3537
CVE-2014-5029
CVE-2014-5030
CVE-2014-5031
CESA-2014:1388
Version: 5
Platform(s): Red Hat Enterprise Linux 6
CentOS Linux 6
Product(s): cups
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 116
Os 3

Nessus® Vulnerability Scanner

Date Description
2015-03-30 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-108.nasl - Type : ACT_GATHER_INFO
2015-03-26 Name : The remote Debian host is missing a security update.
File : debian_DLA-22.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2014-0035.nasl - Type : ACT_GATHER_INFO
2014-11-12 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2014-1388.nasl - Type : ACT_GATHER_INFO
2014-11-04 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20141014_cups_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2014-11-03 Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2014-438.nasl - Type : ACT_GATHER_INFO
2014-10-17 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2014-1388.nasl - Type : ACT_GATHER_INFO
2014-10-14 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2014-1388.nasl - Type : ACT_GATHER_INFO
2014-09-09 Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2341-1.nasl - Type : ACT_GATHER_INFO
2014-08-15 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_cups-140729.nasl - Type : ACT_GATHER_INFO
2014-08-12 Name : The remote print service is potentially affected by an information disclosure...
File : cups_1_7_5.nasl - Type : ACT_GATHER_INFO
2014-08-07 Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2014-151.nasl - Type : ACT_GATHER_INFO
2014-07-31 Name : The remote Fedora host is missing a security update.
File : fedora_2014-8752.nasl - Type : ACT_GATHER_INFO
2014-07-28 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-2990.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
CONFIRM http://advisories.mageia.org/MGASA-2014-0313.html
https://cups.org/str.php?L4455
DEBIAN http://www.debian.org/security/2014/dsa-2990
MANDRIVA http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
MLIST http://www.openwall.com/lists/oss-security/2014/07/22/13
http://www.openwall.com/lists/oss-security/2014/07/22/2
REDHAT http://rhn.redhat.com/errata/RHSA-2014-1388.html
SECUNIA http://secunia.com/advisories/60509
http://secunia.com/advisories/60787
UBUNTU http://www.ubuntu.com/usn/USN-2341-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Date Informations
2020-05-23 01:52:42
  • Multiple Updates
2020-05-23 00:41:43
  • Multiple Updates
2017-01-07 09:25:41
  • Multiple Updates
2016-06-29 00:38:00
  • Multiple Updates
2016-04-27 01:04:11
  • Multiple Updates
2015-09-11 21:24:24
  • Multiple Updates
2015-09-10 21:26:07
  • Multiple Updates
2015-09-10 00:24:07
  • Multiple Updates
2015-09-09 21:25:44
  • Multiple Updates
2015-09-08 21:27:21
  • Multiple Updates
2015-04-22 00:26:23
  • Multiple Updates
2015-04-21 09:25:17
  • Multiple Updates
2015-04-15 09:28:13
  • Multiple Updates
2015-03-31 13:28:42
  • Multiple Updates
2015-03-27 13:28:27
  • Multiple Updates
2014-11-27 13:28:34
  • Multiple Updates
2014-11-14 13:28:38
  • Multiple Updates
2014-11-13 13:27:09
  • Multiple Updates
2014-11-05 13:29:04
  • Multiple Updates
2014-11-05 13:27:59
  • Multiple Updates
2014-11-04 13:27:33
  • Multiple Updates
2014-10-18 13:26:11
  • Multiple Updates
2014-10-16 13:25:34
  • Multiple Updates
2014-09-10 13:26:24
  • Multiple Updates
2014-08-16 13:27:20
  • Multiple Updates
2014-08-13 13:24:58
  • Multiple Updates
2014-08-08 13:24:49
  • Multiple Updates
2014-08-07 05:25:18
  • Multiple Updates
2014-08-01 13:25:26
  • Multiple Updates
2014-07-30 21:24:15
  • Multiple Updates
2014-07-29 21:24:42
  • First insertion