CVE-2014-5030
Severity CVSS v4.0:
Pending analysis
Type:
CWE-59
Link Following
Publication date:
29/07/2014
Last modified:
12/04/2025
Description
CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.
Impact
Base Score 2.0
1.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | ||
| cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:* | 1.7.4 (including) | |
| cpe:2.3:a:apple:cups:1.7:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:cups:1.7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:cups:1.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:cups:1.7.1:b1:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:cups:1.7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:cups:1.7.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://advisories.mageia.org/MGASA-2014-0313.html
- http://rhn.redhat.com/errata/RHSA-2014-1388.html
- http://secunia.com/advisories/60509
- http://secunia.com/advisories/60787
- http://www.debian.org/security/2014/dsa-2990
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A108
- http://www.openwall.com/lists/oss-security/2014/07/22/13
- http://www.openwall.com/lists/oss-security/2014/07/22/2
- http://www.ubuntu.com/usn/USN-2341-1
- https://cups.org/str.php?L4455=
- http://advisories.mageia.org/MGASA-2014-0313.html
- http://rhn.redhat.com/errata/RHSA-2014-1388.html
- http://secunia.com/advisories/60509
- http://secunia.com/advisories/60787
- http://www.debian.org/security/2014/dsa-2990
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A108
- http://www.openwall.com/lists/oss-security/2014/07/22/13
- http://www.openwall.com/lists/oss-security/2014/07/22/2
- http://www.ubuntu.com/usn/USN-2341-1
- https://cups.org/str.php?L4455=



