2.6
CWE
59
Advisory Published
CVE Published
Updated

CVE-2010-2431

First published: Thu Jun 17 2010(Updated: )

Quoting from the upstream bug report <a href="http://cups.org/str.php?L3510">http://cups.org/str.php?L3510</a>: directory that is writable by unprivileged processes. This is a latent privilege escalation vulnerability. It can be exploited only in the presence of other CUPS vulnerabilities. Why this is privilege escalation -------------------------------- This is privilege escalation, because an unprivileged process can trick the CUPS server into overwriting arbitrary files as root. Example: drwxrwxr-x 4 root lp /var/cache/cups -rw-r----- 1 root lp /var/cache/cups/remote.cache This file is opened with cupsFileOpen() which simply opens the file with open(filename, O_WRONLY | O_TRUNC | O_CREAT | O_LARGEFILE | O_BINARY, 0666). If a CUPS "external" program has a vulnerability, an attacker can use the group=lp privileges to replace /var/cache/cups/remote.cache with a symlink to a root-writable file. CUPS will then overwrite that file as root. A similar latent vulnerability exists for the state file /var/cache/cups/job.cache. Why this is a latent vulnerability ---------------------------------- This is a latent vulnerability, because there is no known exploit for CUPS "external" programs that run as user=lp, group=lp. The upstream fix looks more like a preventative fix as there does not seem to be anything exploitable here, so this looks like more a hardening than a response to an actual flaw.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Apple Cups=1.1.20
Apple Cups=1.1.5-2
Apple Cups=1.3.9
Apple Cups=1.1.14
Apple Cups=1.3-rc2
Apple Cups=1.1.6-1
Apple Cups=1.1.18
Apple Cups=1.1.12
Apple Cups<=1.4.3
Apple Cups=1.3.11
Apple Cups=1.1.5-1
Apple Cups=1.3.3
Apple Cups=1.1.22
Apple Cups=1.2.0
Apple Cups=1.1.16
Apple Cups=1.4.1
Apple Cups=1.3.1
Apple Cups=1.1.23-rc1
Apple Cups=1.1.20-rc1
Apple Cups=1.1.15
Apple Cups=1.1.17
Apple Cups=1.1.20-rc6
Apple Cups=1.2.4
Apple Cups=1.1.19-rc1
Apple Cups=1.3.2
Apple Cups=1.1.22-rc1
Apple Cups=1.1.7
Apple Cups=1.2-rc2
Apple Cups=1.1.6-2
Apple Cups=1.3-b1
Apple Cups=1.1.3
Apple Cups=1.2.3
Apple Cups=1.1.21
Apple Cups=1.4.0
Apple Cups=1.2.9
Apple Cups=1.2.10
Apple Cups=1.1.4
Apple Cups=1.1.23
Apple Cups=1.2.6
Apple Cups=1.2-b1
Apple Cups=1.3.8
Apple Cups=1.1.20-rc4
Apple Cups=1.1.19
Apple Cups=1.1
Apple Cups=1.3.4
Apple Cups=1.1.8
Apple Cups=1.1.5
Apple Cups=1.2.1
Apple Cups=1.2-rc3
Apple Cups=1.1.2
Apple Cups=1.3.10
Apple Cups=1.1.13
Apple Cups=1.1.19-rc4
Apple Cups=1.1.9-1
Apple Cups=1.2.12
Apple Cups=1.1.21-rc2
Apple Cups=1.2-b2
Apple Cups=1.2.7
Apple Cups=1.1.6-3
Apple Cups=1.1.20-rc5
Apple Cups=1.1.9
Apple Cups=1.3.7
Apple Cups=1.1.19-rc5
Apple Cups=1.2-rc1
Apple Cups=1.1.1
Apple Cups=1.2.8
Apple Cups=1.2.2
Apple Cups=1.4.2
Apple Cups=1.1.10
Apple Cups=1.2.11
Apple Cups=1.1.22-rc2
Apple Cups=1.1.21-rc1
Apple Cups=1.3-rc1
Apple Cups=1.1.11
Apple Cups=1.1.19-rc3
Apple Cups=1.1.6
Apple Cups=1.1.10-1
Apple Cups=1.3.0
Apple Cups=1.3.5
Apple Cups=1.3.6
Apple Cups=1.1.20-rc2
Apple Cups=1.1.20-rc3
Apple Cups=1.2.5
Apple Cups=1.1.19-rc2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203