CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2012/11/11/5 | mailing list |
http://www.ubuntu.com/usn/USN-1654-1 | vendor advisory |
http://support.apple.com/kb/HT5784 | |
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00006.html | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/80012 | vdb entry |
http://www.openwall.com/lists/oss-security/2012/11/11/2 | mailing list |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692791 | exploit |
http://rhn.redhat.com/errata/RHSA-2013-0580.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00003.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2012/11/10/5 | mailing list |
http://www.securityfocus.com/bid/56494 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00010.html | vendor advisory |