Advisory Published
Updated

REDHAT-BUG-605397

First published: Thu Jun 17 2010(Updated: )

Quoting from the upstream bug report <a href="http://cups.org/str.php?L3510">http://cups.org/str.php?L3510</a>: directory that is writable by unprivileged processes. This is a latent privilege escalation vulnerability. It can be exploited only in the presence of other CUPS vulnerabilities. Why this is privilege escalation -------------------------------- This is privilege escalation, because an unprivileged process can trick the CUPS server into overwriting arbitrary files as root. Example: drwxrwxr-x 4 root lp /var/cache/cups -rw-r----- 1 root lp /var/cache/cups/remote.cache This file is opened with cupsFileOpen() which simply opens the file with open(filename, O_WRONLY | O_TRUNC | O_CREAT | O_LARGEFILE | O_BINARY, 0666). If a CUPS "external" program has a vulnerability, an attacker can use the group=lp privileges to replace /var/cache/cups/remote.cache with a symlink to a root-writable file. CUPS will then overwrite that file as root. A similar latent vulnerability exists for the state file /var/cache/cups/job.cache. Why this is a latent vulnerability ---------------------------------- This is a latent vulnerability, because there is no known exploit for CUPS "external" programs that run as user=lp, group=lp. The upstream fix looks more like a preventative fix as there does not seem to be anything exploitable here, so this looks like more a hardening than a response to an actual flaw.

Affected SoftwareAffected VersionHow to fix
CUPS

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of REDHAT-BUG-605397?

    The severity of REDHAT-BUG-605397 is classified as a latent privilege escalation vulnerability.

  • How does REDHAT-BUG-605397 occur?

    REDHAT-BUG-605397 occurs due to a writable directory that is accessible by unprivileged processes.

  • Can REDHAT-BUG-605397 be exploited without other vulnerabilities?

    No, REDHAT-BUG-605397 can only be exploited in conjunction with other CUPS vulnerabilities.

  • What software is affected by REDHAT-BUG-605397?

    REDHAT-BUG-605397 affects the Apple CUPS software.

  • What steps should be taken to mitigate REDHAT-BUG-605397?

    To mitigate REDHAT-BUG-605397, ensure that directories used by CUPS are not writable by unprivileged users.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203