Lucene search

K
gentooGentoo FoundationGLSA-201404-01
HistoryApr 07, 2014 - 12:00 a.m.

CUPS: Arbitrary file read/write

2014-04-0700:00:00
Gentoo Foundation
security.gentoo.org
36

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

9.3

Confidence

High

EPSS

0.001

Percentile

47.5%

Background

CUPS, the Common Unix Printing System, is a full-featured print server.

Description

Members of the lpadmin group have admin access to the web interface, where they can edit the config file and set some “dangerous” directives (like the logfilenames), which enable them to read or write files as the user running the CUPS webserver.

Impact

A local attacker could possibly exploit this vulnerability to read or write files as the user running the CUPS webserver.

Workaround

There is no known workaround at this time.

Resolution

All CUPS users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-print/cups-1.6.2-r5"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-print/cups< 1.6.2-r5UNKNOWN

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

AI Score

9.3

Confidence

High

EPSS

0.001

Percentile

47.5%