First published: Mon Jun 24 2024(Updated: )
Rory McNamara discovered that when starting the cupsd server with a Listen configuration item, the cupsd process fails to validate if bind call passed. An attacker could possibly trick cupsd to perform an arbitrary chmod of the provided argument, providing world-writable access to the target.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/cups | <2.4.7-1.2ubuntu7.1 | 2.4.7-1.2ubuntu7.1 |
Ubuntu Ubuntu | =24.04 | |
All of | ||
ubuntu/cups | <2.4.6-0ubuntu3.1 | 2.4.6-0ubuntu3.1 |
Ubuntu Ubuntu | =23.10 | |
All of | ||
ubuntu/cups | <2.4.1op1-1ubuntu4.9 | 2.4.1op1-1ubuntu4.9 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/cups | <2.3.1-9ubuntu1.7 | 2.3.1-9ubuntu1.7 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/cups | <2.2.7-1ubuntu2.10+esm4 | 2.2.7-1ubuntu2.10+esm4 |
Ubuntu Ubuntu | =18.04 | |
All of | ||
ubuntu/cups | <2.1.3-4ubuntu0.11+esm6 | 2.1.3-4ubuntu0.11+esm6 |
Ubuntu Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.