The cupsFileOpen function in CUPS before 1.4.4 allows local users, with lp group membership, to overwrite arbitrary files via a symlink attack on the (1) /var/cache/cups/remote.cache or (2) /var/cache/cups/job.cache file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2010:234 | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2010-0811.html | vendor advisory |
http://cups.org/articles.php?L596 | patch vendor advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2010:232 | vendor advisory |
http://www.vupen.com/english/advisories/2010/2856 | vdb entry vendor advisory |
http://www.debian.org/security/2011/dsa-2176 | vendor advisory |
http://security.gentoo.org/glsa/glsa-201207-10.xml | vendor advisory |
http://www.vupen.com/english/advisories/2011/0535 | vdb entry vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=605397 | |
http://secunia.com/advisories/43521 | third party advisory vendor advisory |
http://cups.org/str.php?L3510 |