CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ubuntu_linux | Canonical | 10.04 (including) | 10.04 (including) |
Ubuntu_linux | Canonical | 12.04 (including) | 12.04 (including) |
Ubuntu_linux | Canonical | 14.04 (including) | 14.04 (including) |
Red Hat Enterprise Linux 6 | RedHat | cups-1:1.4.2-67.el6 | * |
Red Hat Enterprise Linux 7 | RedHat | cups-1:1.6.3-17.el7 | * |
Cups | Ubuntu | lucid | * |
Cups | Ubuntu | precise | * |
Cups | Ubuntu | trusty | * |
Cups | Ubuntu | upstream | * |