First published: Tue Jul 29 2014(Updated: )
The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS | =1.7.4 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5029 is considered a medium severity vulnerability due to its potential for local users to exploit file access.
CVE-2014-5029 affects local users in the lp group on systems running CUPS version 1.7.4 as well as several versions of Ubuntu Linux.
To fix CVE-2014-5029, upgrade CUPS to a version later than 1.7.4 or apply relevant security patches provided by your operating system vendor.
The exploit for CVE-2014-5029 involves a symlink attack that allows the reading of arbitrary files by manipulating specific file paths.
Yes, CVE-2014-5029 exists because of an incomplete fix for CVE-2014-3537.