First published: Sun Jan 26 2014(Updated: )
lppasswd in CUPS before 1.7.1, when running with setuid privileges, allows local users to read portions of arbitrary files via a modified HOME environment variable and a symlink attack involving .cups/client.conf.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS | <=1.7.0 | |
CUPS | =1.7-rc1 | |
CUPS | =1.7.1-b1 | |
Ubuntu | =12.10 | |
Ubuntu | =13.04 | |
Ubuntu | =13.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6891 is considered a medium severity vulnerability due to its ability to allow local users to read arbitrary files.
To fix CVE-2013-6891, upgrade CUPS to version 1.7.1 or later, which addresses this vulnerability.
CVE-2013-6891 affects local users running CUPS versions before 1.7.1 with setuid privileges.
The attack in CVE-2013-6891 involves manipulating the HOME environment variable and employing a symlink attack.
Vulnerable software versions include CUPS before 1.7.1 and specific Ubuntu Linux versions such as 12.10, 13.04, and 13.10.