Vulnerability Description
CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Cups | 1.4.4 |
| Debian | Debian Linux | All versions |
Related Weaknesses (CWE)
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791Exploit
- http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2013-0580.html
- http://support.apple.com/kb/HT5784
- http://www.openwall.com/lists/oss-security/2012/11/10/5
- http://www.openwall.com/lists/oss-security/2012/11/11/2
- http://www.openwall.com/lists/oss-security/2012/11/11/5
- http://www.securityfocus.com/bid/56494
- http://www.ubuntu.com/usn/USN-1654-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80012
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791Exploit
- http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
FAQ
What is CVE-2012-5519?
CVE-2012-5519 is a vulnerability with a CVSS score of 7.2 (HIGH). CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local user...
How severe is CVE-2012-5519?
CVE-2012-5519 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-5519?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Cups, Debian Debian Linux.