-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.1239
                           cups security update
                               28 July 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           cups
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Increased Privileges   -- Existing Account
                   Access Privileged Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-5031 CVE-2014-5030 CVE-2014-5029
                   CVE-2014-3537  

Original Bulletin: 
   http://www.debian.org/security/2014/dsa-2990

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running cups check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-2990-1                   security@debian.org
http://www.debian.org/security/                      Salvatore Bonaccorso
July 27, 2014                          http://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : cups
CVE ID         : CVE-2014-3537 CVE-2014-5029 CVE-2014-5030 CVE-2014-5031

It was discovered that the web interface in CUPS, the Common UNIX
Printing System, incorrectly validated permissions on rss files and
directory index files. A local attacker could possibly use this issue
to bypass file permissions and read arbitrary files, possibly leading
to a privilege escalation.

For the stable distribution (wheezy), these problems have been fixed in
version 1.5.3-5+deb7u4.

For the unstable distribution (sid), these problems have been fixed in
version 1.7.4-2.

We recommend that you upgrade your cups packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=M8sW
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=fUar
-----END PGP SIGNATURE-----