GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Mon Apr 07, 2014 8:26 am Post subject: [ GLSA 201404-01 ] CUPS: Arbitrary file read/write |
|
|
Gentoo Linux Security Advisory
Title: CUPS: Arbitrary file read/write (GLSA 201404-01)
Severity: normal
Exploitable: local
Date: April 07, 2014
Bug(s): #442926
ID: 201404-01
Synopsis
A vulnerability in CUPS may allow for arbitrary file access.
Background
CUPS, the Common Unix Printing System, is a full-featured print server.
Affected Packages
Package: net-print/cups
Vulnerable: < 1.6.2-r5
Unaffected: >= 1.6.2-r5
Architectures: All supported architectures
Description
Members of the lpadmin group have admin access to the web interface,
where they can
edit the config file and set some “dangerous” directives (like the
logfilenames), which enable them to read or write files as the user
running
the CUPS webserver.
Impact
A local attacker could possibly exploit this vulnerability to read or
write files as the user running the CUPS webserver.
Workaround
There is no known workaround at this time.
Resolution
All CUPS users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=net-print/cups-1.6.2-r5"
|
References
CVE-2012-5519
Last edited by GLSA on Thu May 29, 2014 4:33 am; edited 2 times in total |
|