First published: Tue Jul 29 2014(Updated: )
The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS | <=1.7.4 | |
CUPS | =1.7-rc1 | |
CUPS | =1.7.0 | |
CUPS | =1.7.1 | |
CUPS | =1.7.1-b1 | |
CUPS | =1.7.2 | |
CUPS | =1.7.3 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5031 is classified as a medium severity vulnerability due to its potential to expose sensitive information.
To fix CVE-2014-5031, update CUPS to version 2.0 or later which implements proper permissions checking.
CVE-2014-5031 affects CUPS versions prior to 2.0, particularly those installed on Apple and specific Ubuntu Linux distributions.
Yes, CVE-2014-5031 can be exploited remotely if an attacker can access the web interface of the vulnerable CUPS installation.
CVE-2014-5031 can potentially expose any files that have world-readable permissions, which may include confidential data.