First published: Tue Jul 29 2014(Updated: )
CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Apple CUPS | <=1.7.4 | |
Apple CUPS | =1.7-rc1 | |
Apple CUPS | =1.7.0 | |
Apple CUPS | =1.7.1 | |
Apple CUPS | =1.7.1-b1 | |
Apple CUPS | =1.7.2 | |
Apple CUPS | =1.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5030 has a medium severity rating due to its potential to allow local users to read arbitrary files.
To fix CVE-2014-5030, you should upgrade to CUPS version 2.0 or later, or apply security patches released by your distribution.
CVE-2014-5030 affects CUPS versions prior to 2.0 and several versions of Ubuntu Linux, including 10.04, 12.04, and 14.04.
CVE-2014-5030 presents a symlink attack vulnerability that allows local users to access restricted files.
You can determine if your system is vulnerable to CVE-2014-5030 by checking your CUPS version and comparing it to the fixed versions.