First published: Wed Jul 02 2014(Updated: )
It was discovered that a local user with privileges of group=lp can write symbolic links in the rss directory and use that to gain '@SYSTEM' group privilege with cupsd. Permissions: drwxrwxr-x. 2 root lp 4096 Jul 2 09:58 /var/cache/cups/rss SELinux mitigates this vulnerability
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS | <=1.7.3 | |
CUPS | =1.7-rc1 | |
CUPS | =1.7.0 | |
CUPS | =1.7.1 | |
CUPS | =1.7.1-b1 | |
CUPS | =1.7.2 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Fedoraproject Fedora | =20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3537 has a critical severity level due to the potential for a local user to gain elevated privileges.
To fix CVE-2014-3537, ensure that systems are updated to the latest version of CUPS that addresses this vulnerability.
CVE-2014-3537 affects local users with group 'lp' privileges on specific versions of Apple CUPS and various Linux distributions.
Yes, SELinux mitigates the effects of CVE-2014-3537 by enforcing security policies.
CVE-2014-3537 impacts Apple CUPS versions up to 1.7.3 and specific Ubuntu and Fedora releases.