First published: Thu Jun 17 2010(Updated: )
Quoting from the upstream bug report <a href="http://cups.org/str.php?L3510">http://cups.org/str.php?L3510</a>: directory that is writable by unprivileged processes. This is a latent privilege escalation vulnerability. It can be exploited only in the presence of other CUPS vulnerabilities. Why this is privilege escalation -------------------------------- This is privilege escalation, because an unprivileged process can trick the CUPS server into overwriting arbitrary files as root. Example: drwxrwxr-x 4 root lp /var/cache/cups -rw-r----- 1 root lp /var/cache/cups/remote.cache This file is opened with cupsFileOpen() which simply opens the file with open(filename, O_WRONLY | O_TRUNC | O_CREAT | O_LARGEFILE | O_BINARY, 0666). If a CUPS "external" program has a vulnerability, an attacker can use the group=lp privileges to replace /var/cache/cups/remote.cache with a symlink to a root-writable file. CUPS will then overwrite that file as root. A similar latent vulnerability exists for the state file /var/cache/cups/job.cache. Why this is a latent vulnerability ---------------------------------- This is a latent vulnerability, because there is no known exploit for CUPS "external" programs that run as user=lp, group=lp. The upstream fix looks more like a preventative fix as there does not seem to be anything exploitable here, so this looks like more a hardening than a response to an actual flaw.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Cups | =1.1.20 | |
Apple Cups | =1.1.5-2 | |
Apple Cups | =1.3.9 | |
Apple Cups | =1.1.14 | |
Apple Cups | =1.3-rc2 | |
Apple Cups | =1.1.6-1 | |
Apple Cups | =1.1.18 | |
Apple Cups | =1.1.12 | |
Apple Cups | <=1.4.3 | |
Apple Cups | =1.3.11 | |
Apple Cups | =1.1.5-1 | |
Apple Cups | =1.3.3 | |
Apple Cups | =1.1.22 | |
Apple Cups | =1.2.0 | |
Apple Cups | =1.1.16 | |
Apple Cups | =1.4.1 | |
Apple Cups | =1.3.1 | |
Apple Cups | =1.1.23-rc1 | |
Apple Cups | =1.1.20-rc1 | |
Apple Cups | =1.1.15 | |
Apple Cups | =1.1.17 | |
Apple Cups | =1.1.20-rc6 | |
Apple Cups | =1.2.4 | |
Apple Cups | =1.1.19-rc1 | |
Apple Cups | =1.3.2 | |
Apple Cups | =1.1.22-rc1 | |
Apple Cups | =1.1.7 | |
Apple Cups | =1.2-rc2 | |
Apple Cups | =1.1.6-2 | |
Apple Cups | =1.3-b1 | |
Apple Cups | =1.1.3 | |
Apple Cups | =1.2.3 | |
Apple Cups | =1.1.21 | |
Apple Cups | =1.4.0 | |
Apple Cups | =1.2.9 | |
Apple Cups | =1.2.10 | |
Apple Cups | =1.1.4 | |
Apple Cups | =1.1.23 | |
Apple Cups | =1.2.6 | |
Apple Cups | =1.2-b1 | |
Apple Cups | =1.3.8 | |
Apple Cups | =1.1.20-rc4 | |
Apple Cups | =1.1.19 | |
Apple Cups | =1.1 | |
Apple Cups | =1.3.4 | |
Apple Cups | =1.1.8 | |
Apple Cups | =1.1.5 | |
Apple Cups | =1.2.1 | |
Apple Cups | =1.2-rc3 | |
Apple Cups | =1.1.2 | |
Apple Cups | =1.3.10 | |
Apple Cups | =1.1.13 | |
Apple Cups | =1.1.19-rc4 | |
Apple Cups | =1.1.9-1 | |
Apple Cups | =1.2.12 | |
Apple Cups | =1.1.21-rc2 | |
Apple Cups | =1.2-b2 | |
Apple Cups | =1.2.7 | |
Apple Cups | =1.1.6-3 | |
Apple Cups | =1.1.20-rc5 | |
Apple Cups | =1.1.9 | |
Apple Cups | =1.3.7 | |
Apple Cups | =1.1.19-rc5 | |
Apple Cups | =1.2-rc1 | |
Apple Cups | =1.1.1 | |
Apple Cups | =1.2.8 | |
Apple Cups | =1.2.2 | |
Apple Cups | =1.4.2 | |
Apple Cups | =1.1.10 | |
Apple Cups | =1.2.11 | |
Apple Cups | =1.1.22-rc2 | |
Apple Cups | =1.1.21-rc1 | |
Apple Cups | =1.3-rc1 | |
Apple Cups | =1.1.11 | |
Apple Cups | =1.1.19-rc3 | |
Apple Cups | =1.1.6 | |
Apple Cups | =1.1.10-1 | |
Apple Cups | =1.3.0 | |
Apple Cups | =1.3.5 | |
Apple Cups | =1.3.6 | |
Apple Cups | =1.1.20-rc2 | |
Apple Cups | =1.1.20-rc3 | |
Apple Cups | =1.2.5 | |
Apple Cups | =1.1.19-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.