First published: Mon Jul 23 2018(Updated: )
The sandbox profile dynamically generated by cupsdCreateProfile() unintentionally allows write access to /etc/cups. This can be used by an attacker that has obtained sandboxed root access to alter /etc/cups/cups-files.conf, leading to unsandboxed root code execution. References: <a href="https://blog.gdssecurity.com/labs/2018/7/11/cups-local-privilege-escalation-and-sandbox-escapes.html">https://blog.gdssecurity.com/labs/2018/7/11/cups-local-privilege-escalation-and-sandbox-escapes.html</a> Upstream patch: <a href="https://github.com/apple/cups/commit/d47f6aec436e0e9df6554436e391471097686ecc">https://github.com/apple/cups/commit/d47f6aec436e0e9df6554436e391471097686ecc</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Apple CUPS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1607284 is considered high due to its potential for unsandboxed root code execution.
To fix REDHAT-BUG-1607284, ensure you update to the latest and patched version of Apple CUPS that addresses this vulnerability.
The impact of REDHAT-BUG-1607284 is that an attacker with sandboxed root access can modify critical configuration files, leading to a full system compromise.
The vulnerable software affected by REDHAT-BUG-1607284 includes Apple CUPS where the incorrectly configured sandbox allows unauthorized file access.
REDHAT-BUG-1607284 typically requires local access for exploitation, but if local access is obtained, it can lead to remote privileges being escalated.