Vulnerability Note VU#557062
CUPS stores user account details in plain text in log file
When an SMB printer is configured, CUPS stores plain text login information to the log file.
CUPS is a cross-platform printing system for UNIX environments. It can use the IPP, LPD, SMB, and JetDirect protocols to interact with printers. The SMB protocol is used to communicate with printers that are shared via Microsoft Windows or other SMB-compatible software such as Samba. When an SMB printer is added or modified, the connection string for the printer is written to the log file in plain text. This connection string will contain a username and password if authentication is required for the printer.
A local authenticated user may be able to retrieve the usernames and passwords for other accounts.
Apply a patch from your vendor
For vendor-specific information regarding vulnerable status and patch availability, please see the Systems Affected section of this document.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Debian||Affected||04 Oct 2004||18 Oct 2004|
|MandrakeSoft||Affected||04 Oct 2004||22 Oct 2004|
|Hitachi||Not Affected||04 Oct 2004||08 Oct 2004|
|NETBSD||Not Affected||04 Oct 2004||05 Oct 2004|
|BSDI||Unknown||04 Oct 2004||04 Oct 2004|
|Conectiva||Unknown||04 Oct 2004||04 Oct 2004|
|Cray Inc.||Unknown||04 Oct 2004||04 Oct 2004|
|EMC Corporation||Unknown||04 Oct 2004||04 Oct 2004|
|Engarde||Unknown||04 Oct 2004||04 Oct 2004|
|F5 Networks||Unknown||04 Oct 2004||04 Oct 2004|
|FreeBSD||Unknown||04 Oct 2004||04 Oct 2004|
|Fujitsu||Unknown||04 Oct 2004||04 Oct 2004|
|Hewlett-Packard Company||Unknown||04 Oct 2004||04 Oct 2004|
|IBM||Unknown||04 Oct 2004||04 Oct 2004|
|IBM-zSeries||Unknown||04 Oct 2004||04 Oct 2004|
CVSS Metrics (Learn More)
Thanks to Gary Smith for reporting this vulnerability.
This document was written by Will Dormann.
- CVE IDs: CAN-2004-0923
- Date Public: 05 Oct 2004
- Date First Published: 19 Nov 2004
- Date Last Updated: 17 Dec 2004
- Severity Metric: 5.06
- Document Revision: 17
If you have feedback, comments, or additional information about this vulnerability, please send us email.